Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Information Technology > Security > Security Management

Browse through our extensive list of free Security Management magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

BAE Systems Business Defense The evolution from cyber security to business defense...
Health Management Technology Has been the Source for Healthcare Information Systems Solutions since 1980...
Eight Key Pressures on Security Operations Identify key pressures and regain control of your security operations...
Multi-Factor Authentication Without Tokens or Passwords Veridium's white paper explains how to use biometric authentication to access Active..
Cyber Warnings E-Magazine - June 2017 Edition Published monthly by Cyber Defense Magazine, Cyber Warnings shares a wealth of information to..
6 Questions For a Prospective Cloud Service Provider Develop a strategy for how to select the right vendor for your business...
Discovering the Unknown: Reducing the Risk of Unauthorized Access to Enterprise Applications and Resources Learn how to maintain an..
Addressing Red Flag Requirements Learn how to use SIEM to implement compliance monitoring...
Symantec DLP for Tablets: An Intelligent Security Decision DLP solutions designed specifically for tablets and other tablets may provide the..
11 Practical Steps to Reduce the Risks of Zero-Day Attacks This paper explains the dangers of zero-day attacks and why traditional defenses..
The Problem with Privileged Users: What You Don't Know Can Hurt You Do you know where data leaks really come from? Download this paper to..
2016 Annual Online Fraud Benchmark Report Fraud management is a challenging balancing act in our increasingly complex and competitive..
11 Security Solutions for Small Business Here are 11 small-business-friendly cybersecurity solutions to get you started on protecting your..
Securing Hadoop: Security Recommendations for Hadoop Environments This research paper lays out a series of recommended security controls for..
Recognizing Five Sources of High-Profile Data Security Breaches Security breaches have rapidly escalated into a major source of reputational..
Cyber Warnings E-Magazine - April 2017 Edition Published monthly by Cyber Defense Magazine, Cyber Warnings shares a wealth of information to..
Combating Identity Fraud in a Virtual World More Connected and Mobile Than Ever...
How a Cyber Threat Group Exploited Governments and Commercial Entities for Over a Decade This special report is a starting point to help an..
Human Vulnerabilities in Our Current Threat Landscape Discover how the current threat landscape pertains to human vulnerabilities and how to..
Network Security Report: The State of Network Security in Schools Discover what IT administrators find most challenging about securing their..
Complying with PCI DSS Requirements with DataStax and Vormetric Discover a comprehensive data security solution that is also PCI DSS..
5 Things You Need to Know about Security and UC The decision to invest in new technology should never be taken lightly...
Securing Sensitive Data in File Shares View this on-demand webinar to learn how to effectively manage access to data in file shares...
Detecting Insider Threats How Splunk software is used to safeguard financial data...
Meer Veiligheid, Minder Frictie 5 belangrijke feiten over het beveiligen van digitale werkplekken...
4 Critical Risks Facing Microsoft® Office 365™ Implementation It seems nearly every technology discussion today somehow involves the..
Your Subscribers Choose You for Great Service Did you know that identity theft was the number one consumer complaint in 2013?..
Reduce Your Open Source Security Risk: Strategies, Tactics, and Tools Learn how to employ new strategies, tactics, and tools to reduce your..
Is Security too Risky to Outsource? Security is persistently top of mind for IT and business leaders because there is so much at stake. Can..
Banking IT Systems Management: Challenges and Solutions Learn how financial institutions can proactively monitor and manage their IT..
Security and HIPAA Compliance: Meeting the Challenge of Securing Protected Health Information Providing greater risk visibility, NetIQ..
Cyber Security Culture Barometer This simple self-assessment is provided in an effort to help you see the impact that your organization's..
The Complete Guide to Log and Event Management This white paper analyzes the relationship between SIEM and log management, focusing not only..
Preparing for The New World of Data Privacy In today's changing global landscape of data privacy, it's important to know the key issues to..
To Outsource or Not to Outsource: That is the Network Security Question This paper discusses how to cost-effectively turn the tables on..
Security Intelligence: Information Sharing Strategies Using Trusted Collaboration Human-source Intelligence (HUMINT) has been used for..
Cybercrime 101 Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental...
Mobile Security: How to Secure, Privatize, and Recover Your Devices: Chapter 3 - Privacy - Small Word, Big Consequences Learn how to keep..
Best Practices for Handling a Data Breach It only takes one stolen laptop, one employee's USB stick, one hacker, one virus, or one careless..
The Complete Guide to Log and Event Management This paper analyzes the relationship between SIEM and log management and architecting their..
HackerProof: Your Guide to PC Security By downloading this free guide, you agree to receive regular updates on the latest cool apps, product..
CREDANT® Mobile Guardian® External Media Shield Discover how to access and update external media from any computer without compromising..
Complying with FISMA Find out what the Federal Information Security Management Act (FISMA) requires of federal agencies and how..
Debunking the Top 5 Security Implementation Myths Even if they know their companies' current security solution isn't effective, many IT..
10 Things Security Experts Wish End Users Knew Learn about the 10 concerns that security experts want you to know...
The Value of QRadar® QFlow and QRadar® VFlow for Security Intelligence As the security threats facing organizations have grown..
Privacy, Identity, and Security: The Growing Risks of Failing to Protect Personal Identity In today's increasingly digital world,..
Mitigating Your Biggest Security Risk: Your Business Users IT and administrator accounts enjoy broad access privileges to sensitive systems..
Guide to Effective Remediation of Network Vulnerabilities and Policy Compliance This guide provides a step-by-step guide for automating the..
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Take the effort out of log management and gain the..
Cyber Security Threat Report: A View From the Front Lines Take a look at the cyber threat landscape as reported from investigations in more..
Finding a Cure for Downtime 7 Tips for Reducing Downtime in Healthcare Information Systems..
Why the Threat of Downtime Should Be Keeping You Up at Night Learn how to easily protect your security systems and keep them running 24/7...
The CISO's Guide to Machine Learning and UBA A Technical Resource for Security Professionals...
Securing Your Future in the Cloud 10 key questions to ask when assessing & selecting a cloud services vendor...
The Executive Guide to Data Loss Prevention Reported data breaches increased by nearly 50 percent in 2008 and industry and regulatory..
Information Security Analysts - Occupational Outlook Information security analysts plan and carry out security measures to protect an..
SANS Review of NetIQ Sentinel 7 A SIEM solution fully installed and capturing logs in under 15 minutes! Read how SANS analyst Jerry Shenk..
Comprehensive Review of Security and Vulnerability Protections for Google Apps Find out how Google protects and secures your company's..
The Complete Guide to Log and Event Management Security Information and Event Management (SIEM) technology has existed since the late 1990s,..
The Case for Security Information and Event Management (SIEM) in Proactive Network Defense Critical elements of effective SIEM systems..
Authentication Solutions Through Keystroke Dynamics Provides an in-depth study of keystroke dynamics and how it's used today to fully secure..
Breaking Into Cyber Security (Free eBook Training Course) A $47 Value! The cyber risk landscape is evolving rapidly in a multitude of areas..
Narrowing the Security Gap with Automated Configuration Assessment Learn how to ensure the safety of sensitive data and IT while meeting..
LifeLock Affinity Program Partners Guide Your members are your business...
The Control Is Yours: Five Reasons to Use Mobile Security Management Applications With security management apps, you can better protect your..
Making Security Technology Work for your Facility These days security technology must surpass simply being an effective crime deterrent...
5 Strategies for Email Data Loss Prevention The average employee sends and receives about 110 emails each day or 29,000 emails per year...
An Innovative Approach to Protecting Critical Data Learn how to protect critical data by concealing network endpoints and assets from..
Extracting Value from Enterprise Log Data Leverage a log management solution to automate security monitoring and regulatory compliance,..
SANS Analyst Review - Log Management SANS Analyst Review of Log Management, highlighting ArcSight Logger, by analyst Jerry Shenk...
IT GRC Turning Operational Risks into Returns Learn how to turn your company's IT GRC processes into strategic assets...
Why Cloud-Based Security and Archiving Make Sense Learn how email archiving has become a critical “best practice” for..
Demystifying the Payment Card Industry – Data Security Standard Learn the 12 requirements for compliance with the PCI Data Security..
Why Cloud-Based Security and Archiving Make Sense Cloud computing is one of the most significant trends in IT today...
Why Some Things Shouldn't Go Viral Preventing breaches is only as effective as your employees' grip on their devices...
TriGeo Security Information Management in the Payment Card Industry: Using TriGeo SIM To Meet PCI Requirements Security Event and..
Cyber Warnings E-Magazine - February 2017 Edition Published monthly by Cyber Defense Magazine, Cyber Warnings shares a wealth of information..
EMA Research: The Business Case for Striking an Optimal Balance of Endpoint Control Tips for determining ROI related to locking down PCs...
HIPAA and Beyond - How to Effectively Safeguard Electronic Protected Health Information Explore how to go beyond HIPAA by learning how to..
IT Security Vendor Analysis by Bizety This paper examines 5 major vendors and outlines how their products can coordinate to successfully..
Alert Prioritization and Incident Investigation Prioritize and investigate the most significant alerts. Perform historical impact assessment..
Why the Threat of Downtime Should Be Keeping You Up at Night Learn how to easily protect your security systems and keep them running 24/7...
NAC: Managing Unauthorized Computers Learn how your enterprise can combat today's threats and still remain nimble enough for tomorrow's..
15 Steps to Reducing Security Risks in Business Mobility For small to medium-sized businesses, malicious attacks are by far the leading..
IT Security Alerts: How Many is Too Many? Assess the current state of your alert process and start to improve your organization's management..
When Worlds Collide: Cloud Apps and Financial Services Learn how to use cloud access security brokers to overcome cloud security and..
Best Practices for Securing Your Enterprise Wireless Network Learn five best practices to secure enterprise networks from unauthorized use..
LifeLock Identity Theft Protection Comparison Ever wonder how LifeLock Identity Theft Protection compares to typical free card-based..
Management Guide for Fighting Cyber Predators This guide aims to provide structure and guidance to those who wish to protect themselves and..
IxSecure: 360° Security Protection Security is much more than layers of defense...
The Client Mandate on Security Like most other organizations, law firms face new challenges every day when protecting their confidential..
Operationalizing Security & Policy Compliance: A Unified Approach for IT, Audit and Operation Teams Learn the five major information..
The Cyber Security Playbook: What Every Board Of Directors Should Know Before, During, And After An Attack. This playbook is a starting..
Managed Appliances: Security Solutions That Do More Learn how managed appliances enable efficient security management by reducing daily..
Business Justification for Privilege Management Learn the benefits Enterprise IT Managers gain by deploying privilege management solutions..
Aberdeen Group: Selecting Encryption for 'Data at Rest' in Back-End Systems What risks are you trying to address?..
The Big Shift to Cloud-based Security Learn how small and medium-sized organizations can manage their IT risks and maintain regulatory..
The Numbers Game: How Many Alerts is too Many to Handle? This report details the survey results of all aspects of alert management -..
Cybersecurity: A Small Business Guide An overview of everything you need to know to protect yourself and your business...
Advanced Threat Targets in Europe, Middle East and Africa: What You Need To Know Get an overview of the advanced persistent threats..
3 Things to Consider When Buying a Single Sign-On Solution (FREE Requirement Checklist) This guide will make any IT Director's job a whole..
QTS Data Security Secures Sensitive Data in the Cloud QTS Data Security -- Securing data-at-rest more effectively than full disk encryption,..
The Business Case for Protecting Against Advance Attacks: Demonstrating the ROI of FireEye as a Service to Non-Technical Executives This..
The New Encryption Generation: Closing the Gap Get the Complete Story on Encryption...
Schrodinger Helps Pharmaceutical Researcher Make Breakthroughs Sooner with the Help of AWS Find out why Schrodinger turned to Amazon Web..
Security Expertise for Businesses Like Mine A burglary has far-reaching consequences that can jeopardize your livelihood. Your response to a..
The Risks of One-Size-Fits-All Security Individualized security measures can help owners rest easy...
3 Key Benefits of Desktop Lockdown with Privilege Management Learn about the advantages when end users are operating without local..
SANS Analytics and Intelligence Survey Despite perceived gains in security analytics and intelligence capabilities, many organizations are..
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Take the effort out of log management and gain the..
The Generation-D Dilemma: How Tech-Savvy Workers are Affecting Enterprise Security Learn how to enable your digital workers without losing..
Isn't The Cloud Already Secure? Learn how to protect corporate data in the cloud...
Security and Compliance in the Cloud As an IT professional, learn how to build a cloud-ready security program...
Authentication Cheat Sheet Excellent authentication guidance in an easy to read format..
Adding Value Research Brief for Affinity Organizations The more information people share online, the more they have at risk...
Ten Risky Security Behaviors to Avoid: Protect Your Organization Learn about common risky behaviors that typical workers engage in and what..
Security: The Wireless Revolution is Here Learn to address security risks in wireless handheld computing systems with a solution that..
Best Practices for Security Remote and Mobile Devices Discover the best practice approach to mobile and remote security designed to..
The Case for Mobile Security Management See how your phone can help eradicate business threats...
SANS Review of NetIQ Sentinel 7 A SIEM solution fully installed and capturing logs in under 15 minutes! Read how SANS analyst Jerry Shenk..
Protect Your iCloud Account With These 4 Easy Steps By downloading this free guide, you agree to receive regular updates on the latest cool..
Top Security Predictions for 2016 This year is crucial as we expect the size, severity and complexity of cyber threats to continue to..
Close Your Security Gaps with Advanced Threat Protection Learn how adding a layer in the cloud can help close your security gaps...
Security Challenges,Threats and Opportunities -- C-Suite Insights C-level insights and perspectives on IoT security and other growing threats..
After A Data Breach: Managing Identity Theft Effectively Life can seem surreal for identity victims...
7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction Learn essential aspects of putting into place a measurable..
Practical Guide to IT Security Breach Prevention Part II Learn how to reduce mobile, web and social media risks from a security breach...
Changing the Security Monitoring Status Quo Solving SIEM problems with security analytics...
Contractor Access: Mitigating Security and Risk Issues Having contractors doesn't have to mean increased risk...
The 2016 Bad Bot Landscape Report Learn about the industry's most in-depth analysis about the sources, types, and sophistication levels of..
Picking a Sensible Mobile Password Policy for Your Employees SilverSky's Chief Technology Officer discusses six policy elements that will..
Debunking the Top 5 Security Implementation Myths Even if they know their companies' current security solution isn't effective, many IT..
MongoDB Performance with Vormetric Transparent Encryption In enterprises around the world, data volumes have been undergoing explosive..
Snake-in-the-Grass Syndrome Protect Private Information through Redaction: Analysis and Recommendation..
Single Sign-On: with Passwords, Less is More Is password fatigue inhibiting the productivity of your workforce?..
Achieving Configuration Compliance in a Regulatory Framework Find out how to achieve automated configuration compliance with an appliance..
Five-Step Plan for Securing Your Enterprise WLAN Decomposes the challenge of securing an enterprise WLAN and recommends best practices to..
Using Micro-Segmentation to Make Cybersecurity Work Learn why micro-segmentation is the great security hope that will allow your..
Malicious Insider & Negligent Employee Activity Detection Address the insider threat, recognized as a significant risk to organizations, by..
The Hidden Security Threat – When Ex-Employees Represent a Security Risk Revenge of the recently departed – preventing data loss..
Accelerate Insight for Financial Services: Reduce Risk. Stop Fraud. Increase Profits. Learn how the ParAccel Analytic Database (PADB)..
It's Time Businesses Wake Up to Mobile Security Reality Ready or not, you need an MDM solution...
Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from..
7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction Learn essential aspects of putting into place a measurable..
Compromised Users and Hosts - Detection with Behavioral Analytics Attacks involving compromised users and hosts are notoriously difficult to..
Cyber Defense Magazine - 2017 Predictions Secure your IT world and keep pace with an ever changing cyber security landscape...
Cyber Warnings E-Magazine - March 2017 Edition Published monthly by Cyber Defense Magazine, Cyber Warnings shares a wealth of information to..
A Comprehensive Mobile Threat Assessment Find out what FireEye researchers uncovered when they analyzed more than 7 million iOS and Android..
The Complete Guide to Log and Event Management Learn about SIEM and Log Management use cases, differences, best practices and common..
How to Make a Case for Investing in an Integrated Cyber Security Platform This white paper demonstrates the ROI of FireEye as a Service to..
Cyber Crime and IT Risk The top articles for Risk Professionals seeking up-to-date knowledge of key regulation and compliance...
IPSec vs. SSL VPNs for Secure Remote Access Learn how Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec..
A Summary of Russia's Threat in Cyberspace This paper looks at an Advanced Persistent Threat (APT) group engaged in espionage against..
How to Build a SOC with Limited Resources Your guide to detecting and responding to threats fast-- even if you don't have a 24x7 SOC...
Keeping Your Laptop Users Up & Running How to address business continuity, information security, policy enforcement, and regulatory..
Quantifying the Value of Software Asset Management Discover how a SAM solution can drive real benefits and cost savings to your organization...
Secure Partner Access: Protect Your Network from Third-Party Attacks via Partner Networks In an increasingly connected world, most..
Protect Yourself and Your Company from Advanced Cyber Attacks This self-assessment is designed to point you in the right direction as you..
Get Started with GLBA and FFIEC Compliance How to build effective risk assessment processes in banks and credit unions...
Protection Starts with Security Management Solutions from NetIQ Enterprises are under constant attack from internal and external threats...
Identity Theft Protection Adds Value to Your Service Offering This report distills key research findings about the services your members and..
Security and Compliance in the Cloud Learn how to build a cloud-ready security program...
Tune Fraud Rules Faster With Predictable Results. Read The eBook The pressures to effectively manage eCommerce fraud today are growing...
Sustainable Compliance - How to Reconnect Compliance, Security and Business Goals Learn strategic approaches to streamlining your compliance..
The 7 Things that IT Security Professionals MUST KNOW! Gain key insight into security problem and find the safest means to protect your..
Insurance Carriers: Growth Through Third-Party Products The future growth of insurance carriers depends on a dizzying array of factors...
 
Copyright © 2017 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to TradePub.com's Privacy Policy.
Resources: | FAQ | Legal Notices