We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.
Premium Editorial By Topic
-
- Featured Premium Editorial
- Biometric Technology
- Business Management: Security Support and Executive Communications
- Client security
- Data Loss Prevention
- Data Privacy and Protection
- Data Security and Cloud Computing
- Database Security Management
- Disk Encryption and File Encryption
- Emerging Information Security Threats
- Enterprise Risk Management: Metrics and Assessments
- Enterprise User Provisioning Tools
- Hacker Tools and Techniques: Underground Sites and Hacking Groups
- Handheld and Mobile Device Security Best Practices
- Information Security Incident Response-Detection and Analysis
- Information Security Jobs and Training
- Information Security Laws, Investigations and Ethics
- Information Security Policies, Procedures and Guidelines
- IT Security Audits
- Malware, Viruses, Trojans and Spyware
- Monitoring Network Traffic and Network Forensics
- Network Access Control Basics
- Network Behavior Anomaly Detection (NBAD)
- Network Device Management
- Network Firewalls, Routers and Switches
- Network Intrusion Detection (IDS)
- Network Intrusion Prevention (IPS)
- Network Protocols and Security
- PCI Data Security Standard
- Secure SaaS: Cloud services and systems
- Securing Productivity Applications
- Security Awareness Training and Internal Threats-Information
- Security Event Management
- Security Industry Market Trends, Predictions and Forecasts
- Security Testing and Ethical Hacking
- Security Token and Smart Card Technology
-
-
Putting a social layer into every business app
August 2013, Vol. 24
Includes:- Building a social enterprise means putting 'social' into the workflow
- Real-time data analytics drops a beat on the online music industry
- Building a social workflow process for today's enterprise no easy task
Tech startups inspiring retail IT innovations
6 August 2013
Includes:- Windows XP migration: Reassess your desktop IT strategy
- Case Study: Johnson Matthey consolidates Active Directory with Dell
August 2013 Vol. 12 No. 6
Includes:- The state of mobile device backup
- Configuring Hyper-V storage
- Implementing cloud-based disaster recovery: Six key steps
Unlock new pathways to network security architecture
July/August 2013 / Volume 15 / No. 6
Includes:- Enterprise mobile security by the numbers
- Unlock new pathways to network security architecture
- Third-party risk management: Horror stories? You are not alone
-
Page 1 of 1
Security researchers on biometrics, insider threats, encryption and virtualization
November 2008
Includes:- Product Review: Symark PowerADvantage 1.5
- Security services: Fiberlink's MaaS360 Mobility Platform
- Layoffs, Mergers Put Focus on Data Protection
Page 1 of 1 -
Improving your network security strategy in a recession
February 2009
Includes:- Product Review: Rohati TNS 100
- Encryption, DLP, disaster recovery top 2009 priorities
- Product Review: IronKey Enterprise Secure Flash Drive
How to be successful with your security steering committee
January 2009
Includes:- Internal auditors and CISOs mitigate similar risks
- Information security steering committee best practices
- Rising Profile
Why business managers are a breed of security professional
July 2005
Includes:- nCircle's IP360 Vulnerability Management System product review
- Linux's Best Friend
- The Business Case for Network Security: Advocacy, Governance and ROI
Closing the gap: How to decide when (and if) to patch vulnerabilities
February 2004
Includes:- Red-zone defense: Products to prevent IP Leakage
- Cyberspace security liability lawsuits on the rise?
- A Patch in Time: Considering automated patch management
-
Page 1 of 1
Cloud initiatives are changing roles for information security managers
January/February 2011
Includes:- Enforcing endpoint security
- The state of critical infrastructure security
- Information security roles growing in influence
Combatting the new security threats of today's mobile devices
April 2010
Includes:- Economic recovery strategies for information security professionals
- ISP shutdown slows Zeus botnet
- Technologies to thwart online banking fraud
Comparing seven top integrated endpoint security suites
November 2007
Includes:- Product review: Workshare Professional 5
- Product review: Paraben's P2 Enterprise Shuttle
- Product review: Seven integrated endpoint security products
Page 1 of 1 -
Page 1 of 1
Filling the data protection gap
January/February 2010
Includes:- New data protection laws
- Endpoint DLP fills data protection gap
- Disaster recovery plans and DLP solutions top 2010 priorities
Real-world solutions for data loss prevention
April 2009
Includes:- Tying log management and identity management shortens incident response
- Tabletop exercises sharpen security and business continuity
- Data loss prevention benefits in the real world
Nine tips to guarding your intellectual property
May 2007
Includes:- Viewpoint: What if you can't afford pen-testing?
- Are you putting information at risk by using contractors?
- Managed security services: Cybertrust's Managed Security Services
January 2006
Includes:- Recent Releases: Security product briefs, January 2006
- Preventing Data Theft, Combating Internal Threats
- Secure Reads: Security and Usability
Page 1 of 1 -
Inside the Data Accountability and Trust Act and what it means for security
December 2010
Includes:- Vendor risk management and the CISO
- Disaster recovery and contingency planning security considerations
- Understanding the Data Accountability and Trust Act
How automated compliance solutions can help you plan for your next audit
May 2009
Includes:- Cybersecurity Act of 2009: Power grab, or necessary step?
- Changing times for identity management
- Ease the compliance burden with automation
Reflections on the impact of Sarbanes-Oxley
December 2007/January 2008
Includes:- Reflections
- Future
- Milestones
Compliance vs. security: Prevent an either-or mentality
March 2007
Includes:- Viewpoint: Creative patch management workarounds
- Risk Policy: Elemental Security Platform product review
- Product review: e-DMZ Security's eGuardPost
-
Page 1 of 1
Successful cloud migrations require careful planning
April 2011
Includes:- Application whitelisting: an extra layer of malware defense
- Antivirus vendors go beyond signature-based antivirus
- Key steps for security incident response planning
Page 1 of 1 -
Page 1 of 1
How to watch over your data with effective database activity monitoring
May 2010
Includes:- Database activity monitoring keeps watch over your data
- OWASP Top 10 vulnerabilities list adds risk to equation
- Microsoft Windows 7 security features
Step-by-step guide to avoiding basic database security risks
December 2009
Includes:- Writing security policies using a taxonomy-based approach
- Carefully evaluate providers' SaaS security model
- Basic Database Security: Step by Step
Exposed: Why your AV software is failing to protect you
June 2004
Includes:- Antivirus software comparison, 2004: Not all AV products are equal
- Physical and IT Security: Overcoming Security Convergence Challenges
- NAC best practices and technologies to meet corporate security policy
Page 1 of 1 -
Page 1 of 1
Finding affordable encryption options for laptop data security
June 2010
Includes:- Demystifying governance, risk and compliance
- Cloud computing risks and how to manage them
- Symantec acquisitions cement encryption-as-a-feature
Data encryption best practices
Ever since Bank of America disclosed in 2005 that it lost a backup tape with customers’ personal data, nearly 80 other companies have reported similar embarrassing mishaps. These data breaches and new regulatory mandates are fueling the exploding interest in encryption. This exclusive e-book evaluates today's encryption technologies from all angles and projects trends to give you a complete picture of today's encryption landscape. Access this resource today.
View E-Book
Page 1 of 1 -
Emerging threat detection techniques and products
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing problem, penetrating networks and stealing intellectual property. This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
View E-Handbook
March 2013/ Volume 15 / No. 2
Includes:- Outsourcing security services in the enterprise: Where to begin
- Managing big data privacy concerns: Tactics for proactive enterprises
- Antivirus evasion techniques show ease in avoiding antivirus detection
The China Syndrome: Security factors to consider before buying Chinese IT
February 2013/ Volume 15 / No. 1
Includes:- IT Security Trends 2013: Mobile security concerns tops the list
- The Huawei security risk: Factors to consider before buying Chinese IT
- BYOD security strategies: Balancing BYOD risks and rewards
Threat management: Devising a new strategy to tackle today's cyber attacks
Trying to prepare your defenses against a constantly shifting threat landscape can be a demanding task. New threats – such as mobile malware, targeted attacks, and compromised social media – can open the door to cyber attack; so what do you need to know in order to stay protected? Read this handbook today for a complete overview of today’s threat landscape, including an exploration of the new platforms cybercriminals are targeting, key antimalware strategies, and more.
View E-Handbook
-
May 2013 / Volume 15 / No. 4
Includes:- Editor’s desk: A chat with Peter G. Neumann
- Reframing compliance with a threat model
- Apple security update: Is it ready for the enterprise?
Understanding governance, risk and compliance frameworks
Governance, risk and compliance frameworks, tools, and strategies are essential to the success of today’s corporate information security programs. This in-depth e-book explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.
View E-Book
Top considerations for midmarket security
March 2009
Includes:- Five considerations for securing a midmarket company
- How to Secure Cloud Computing
- Choosing the right Web application firewall
Keeping on top of risk management and data integrity essentials
May 2005
Includes:- Instant Messaging: Akonix L7 Enterprise 4.0
- Recent Releases: Security product briefs, May 2005
- Trust Us
-
Special manager's guide: Monitoring identities
August 2006
Includes:- Three Pitfalls to Avoid
- Buyers look for demonstrable success in innovative companies
- IDP
Identity crisis solved: Tips from a top identity management expert
May 2006
Includes:- Safety Net
- Sendmail Sentrion GP product review
- Vulnerability Assessment
-
Page 1 of 1
Is your data safe from next-generation attackers?
June 2006
Includes:- Configuration Management: FullArmor's FullArmor PolicyPortal
- Intrusion Prevention: McAfee's IntruShield 3000
- Today's Attackers Can Find the Needle
What are botnets and how can you prepare for them?
March 2005
Includes:- Guardians of the Crown Jewels
- Configuration Management: St. Bernard Software's SecurityEXPERT 1.0
- BARRIER1 Model 50 product review
Page 1 of 1 -
The rapid evolution of MDM solutions
June 2013 / Volume 15 / No. 5
Includes:- Are FedRAMP security controls enough?
- Big data analytics: New patterns emerge for security
- MDM products: More calls to secure a mobile workforce
Strategies for tackling BYOD: How to ensure mobile security
Bring your own device (BYOD) and the consumerization of IT are realities of the modern workplace that cannot be ignored. When employees are empowered with the choice of using their own consumer-based devices in the workplace, it is imperative to counter the move in IT to ensure security and control. This information security handbook offers advice on controlling the onslaught of employee-owned devices in the workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT. Read now for expert advice on tackling the issues BYOD brings and ensuring security in a mobile world.
View E-Handbook
An inside look at network security technologies
Finding malware, or worse, attackers pivoting from server to server on your network, is a difficult proposition. Persistent, motivated hackers are adept at developing code that evades detection from signature-based network security devices. And more often than not, attackers are penetrating enterprise networks using legitimate credentials stolen via social engineering scams. This informative handbook outlines how to better safeguard your network. Get the latest tips on network security technologies, and advice from our experts.
View E-Handbook
New security strategies for the bring-your-own-device era
May 2012
Includes:- Thwarting BYOD risks starts with a mobile security policy, experts say
- Deploying DP systems: Four DLP best practices for success
- Mobile device management systems help mitigate BYOD risks
-
Page 1 of 1
Computer incident response teams are a new line of defense
July/August 2011
Includes:- Striving for better information security intelligence
- Information security market consolidation: A mixed bag
- Turn your computer incident response team into counter-threat operations
Spotlight on the incident response hot seat
April 2005
Includes:- Secure Reads: The Executive Guide to Information Security
- Antivirus: Kaspersky Anti-Virus Business Optimal 5.0
- Warning Lights
Page 1 of 1 -
Security 7 Award winners sound off on key information security issues
October 2008
Includes:- Security 7 Award winners tackle important information security issues
- LogRhythm product review
- Product Review: Finjan Vital Security NG-5000
Tips from the 2007 Security 7 Awards
October 2007
Includes:- Guardium SQL Guard 6.0 product review
- SonicWALL TZ 180W firewall product review
- Device Management: Pointsec Protector software review
CISO survival guide: 18 of the best security tips
July/August 2007
Includes:- Antivirus: ESET's NOD32 Antivirus 2.7
- Securing Extranets
- At Your Service: Veracode's SaaS-based application analysis
How to tell if you need the help of security integrators and consultants
June 2007
Includes:- Security services firms: When and how to choose the right consultant
- Encryption key management blunders can render deployments useless
- Product review: Unified threat management (UTM) devices
-
Page 1 of 1
SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation. Get the latest tips and expert advice on NERC compliance in one place.
View E-Book
Are you secure? Adam Putnam says, "Prove it!"
May 2004
Includes:- Why and how the CISO job description is changing
- Using email spam filtering techniques to get rid of spam
- Should new information security laws include auditing requirements?
Page 1 of 1 -
Page 1 of 1
How to implement a change management that works and reduces security risks
November 2009
Includes:- Integrated change management reduces security risks
- Messaging security risks have upper hand on solutions
- Metasploit Project acquisition ups ante for penetration testing market
Page 1 of 1 -
Page 1 of 1
Reviews of six top Web application firewalls
March 2008
Includes:- Viewpoint: War analogies tread a fine line
- SonicWALL NSA E5500 product review
- Product review: Palo Alto Networks PA-4050
Page 1 of 1 -
Page 1 of 1
Help! Evaluating AV solutions and tech support
October 2004
Includes:- The self-defending network: Is it real technology or market speak?
- Preventing spyware and third-party attacks
- Antivirus vendor review 2004: Is AV customer support dying?
Page 1 of 1 -
Page 1 of 1
Enterprise network security visibility: Beyond traditional defenses
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology.
View E-Handbook
Page 1 of 1 -
Page 1 of 1
Lessons learned from good and bad NAC implementations
September 2008
Includes:- Product Review: Altor Networks' Virtual Network Security Analyzer (VNSA) 1.0
- Product Review: Workshare Protect Premium 6.0
- Sophos Endpoint Security and Control 8.0 product review
Page 1 of 1 -
Page 1 of 1
Betting the house on network anomaly detection systems
August 2005
Includes:- Password Security
- Paper or PKI?
- Wireless security review: Juniper Networks' Netscreen-5GT Wireless
Page 1 of 1 -
Page 1 of 1
Unlock new pathways to network security architecture
July/August 2013 / Volume 15 / No. 6
Includes:- Enterprise mobile security by the numbers
- Unlock new pathways to network security architecture
- Third-party risk management: Horror stories? You are not alone
Page 1 of 1 -
Page 1 of 1
Screen test: App-layer controls beef up perimeter firewalls
March 2004
Includes:- Making an example: Enforcing company information security policies
- Military information technology: Computer network defense in Iraq
- Ensure secure routing protocols with access control best practices
Page 1 of 1 -
Special Edition, May 2013
Includes:- The evolution of threat detection and management
Network security best practices and essentials
Your network security is increasingly complex and the ostensibly simple matter of just keeping track of its components has spawned a slew of network discovery tools. But if that complexity weren’t enough, the attacks that chew at your network every day are also growing in complexity and stealth at breakneck speed. So you need a correspondingly complex set of network security tools. And more than that, you need strategy. The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
View E-Handbook
IDSes takes aim: Emerging "target-based" systems improve intrusion defense
January 2004
Includes:- Business continuity roles improve security incident management
- 'Targeted' perimeter defense improves network-based intrusion detection systems
- Passive scanning: A new take on network vulnerability scanning
Defense-in-Depth: Securing the network from the perimeter to the core
June 2003
Includes:- Designing a defense-in-depth network security model
- Keeping security initiatives on track through executive, management turnover
- Roundtable: Practical strategies for enterprise-wide risk management
-
Page 1 of 1
Comparing five of the top network-based inline IPS appliances
November 2005
Includes:- Content Filtering: InterScan Web Security Suite 2.5
- Recent Releases: Security product briefs, November 2005
- On the Line
Page 1 of 1 -
Page 1 of 1
With SSL VPNs on the offense, will IPSec VPNs eventually be benched?
June 2005
Includes:- Unwelcome Callers
- E-mail Security: Symantec Mail Security 8200 series
- TriGeo Network Security's TriGeo Security Information Manager 3.0
Page 1 of 1 -
Page 1 of 1
Technical guide on PCI: Global compliance trends
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI global compliance.
View E-Book
Comprehensive information security programs vital for PCI compliance
May 2011
Includes:- Smartphone encryption, authentication ease mobile management
- Robust information security program key to PCI compliance requirements
- Gaining awareness to prevent social engineering techniques, attacks
PCI DSS: Next-generation data security, storage and integrity
SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard. We have the latest PCI DSS advice and best practices from experts in this guide. Check it out today to get all of your PCI DSS questions answered.
View E-Book
Page 1 of 1 -
Page 1 of 1
Setting up for BYOD success with enterprise mobile management and mobile application security
September 2012
Includes:- Mobile application security best practices in a BYOD world
- Security as a Service: Benefits and risks of cloud-based security
- Malware analysis tools and techniques failing but researchers aim for improvement
Software as a Service: Top things to know when moving to SaaS
Tough economic times are forcing some organizations to take a closer look at Software as a Service (SaaS). But does SaaS have the speed and security you need? Check out this expert e-book and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
View E-Book
Seven questions to ask before committing to SaaS
May 2008
Includes:- Identity Management Suites Enable Integration, Interoperability
- SaaS Offering Handles SSO
- Product review: Mandiant Intelligent Response 1.0
Page 1 of 1 -
Page 1 of 1
Technical guide to secure collaboration software
TechTarget's Security Media Group presents a comprehensive guide to secure collaboration software. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice communications via VoIP or Skype.
View E-BookApplication security fuide: Scanning production applications
This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications, and get all of your toughest application security questions from experts.
View E-Book
Page 1 of 1 -
Page 1 of 1
What's your biggest information security concern?
December 2006
Includes:- Risk Management: Skybox Security's Skybox View 3.0
- Host-Based IPS
- Finding the best security testing tools for product evaluation
Top forensics tools for tracking down cybercriminals
December 2005
Includes:- Application Security: Cenzic's Hailstorm v2.6
- To Catch a Thief
- Thinking Ahead
Page 1 of 1 -
Exploring the benefits of enhanced SIEM products
March 2012
Includes:- Symantec breach highlights remote management holes
- Unlocking the opportunity of SIEM technology
- The RSA breach: One year later
Winning strategies for integrating security information management and identity access management
March 2010
Includes:- Knowledge-based authentication poses privacy issues
- Joining security information management systems with identity management systems boosts security
- Creating meaningful information security metrics
Log management best practices for enterprises
Are you bound to regulations? Then you’re no stranger to log management, and the importance of analyzing the reams of data your devices produce. Log management is covering several important aspects of network security. The four major chapters of this e-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more about the latest log management best practices for enterprises.
View E-Book
Effective strategies for risk management and security information management systems
June 2009
Includes:- How to write a risk methodology that blends business, security needs
- Mature SIMs do more than log aggregation and correlation
- Risk management must include physical-logical security convergence
-
Seven Outstanding Security Pros in 2012
Nov. 2012/Volume 14/No. 9
Includes:- GRC Management and Critical Infrastructure Protection
- Cloud Compliance: Tackling Compliance in the cloud
- Information Security Decisions: From Dogma to Data
Security Readers' Choice Awards 2012: Your picks for the best security products
October 2012
Includes:- The hacktivist threat to enterprise security
- Malware trends: The rise of cross-platform malware
- 2012 Readers' Choice Awards
Spotlight on top security trends of 2011 and Security 7 award winners
October 2011
Includes:- Winners of the 2011 Security 7 Award have their say
- Antimalware product suites: Understanding capabilities and limitations
- Breaches prompt call for certificate authority architecture alternatives
The top 2011 security products: Information Security Readers' Choice Awards
September 2011
Includes:- Microsoft BlueHat prize wins over Black Hat Crowd
- Best Web security products 2011
- Best Web application firewalls 2011
-
Page 1 of 1
Establishing an effective internal security pen testing methodology
July/August 2012
Includes:- Three steps for securing SharePoint
- Talk of cyberwarfare threats heats up with Flame malware
- How to pen test: Why you need an internal security pen testing program
Page 1 of 1 -
Page 1 of 1
Deep dive into authentication methods and best practices
Is your token authentication vulnerable to exploit or attack? In this handbook, discover how to lock down two-factor authentication methods in the enterprise. Then, we look at authentication methods such as two-factor tokens, biometrics and cloud-based options. We'll also help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole, and how you can replace the ubiquitous authenticator in your business.
View E-Handbook
An expert guide to tokenization and using it effectively
April 2012
Includes:- Unified threat management devices for the enterprise
- Understanding tokenization: What is tokenization and when to use it
- Web browser security features make attacks harder
Page 1 of 1
-
Featured E-ZINES on searchSecurity.comView all >>
-
Information Security magazine
Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.
-
Modern Infrastructure
Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.
ALL TECHTARGET E-ZINES
Featured E-BOOKS on searchSecurity.comView all >>
-
From virtualization to cloud computing
Many companies have become comfortable with virtualization, which lays the foundation for developing a private or hybrid cloud strategy. But to optimize their infrastructure, IT pros need to understand that a cloud environment has some key differences from an environment that is just virtualized. In this e-book series, we define the cloud and the attributes—like automation, chargeback and new management tools and strategies—that take virtualized data centers to the next level. With advice on selecting virtualization vendors and tools that will help in this process, readers will be able to make informed decisions about their virtualization strategy and design a smart architecture for cloud, rather than approaching it on a costly trial-and-error basis.
-
Storage for VMware
Many of today's storage managers are well versed in virtual server storage and its benefits. But they are also growing familiar with the host of unique challenges, efficiencies and trouble spots associated with storage for VMware environments. With a clear understanding of the complexity these environments can mask, data storage managers can reap the promised benefits associated with VMware projects. This ebook offers practical tips and expert analysis on topics such as migration, thin provisioning and vStorage APIs. We outline VMware architectural choices; offer performance monitoring and maintenance tips; and outline specific troubleshooting steps for profile-driven storage and storage I/O control. Use this e-book to outline your VMware storage strategy and make the most of your virtualized environment.
OTHER FEATURED E-BOOKS
Featured E-HANDBOOKS on searchSecurity.comView all >>
-
WCM playbook: Becoming a Web content management pro
Choosing systems and software that facilitate Web content management is more important than ever. This handbook offers tips for selecting WCM software, optimizing delivery of Web content to mobile devices and tagging Web content to generate performance metrics.
-
Understanding secure, electronic storage of healthcare information
The need for secure storage of personal health information, imaging data and other related medical data continues to increase as more healthcare information becomes electronic. Health systems are managing petabytes of data and must consider storage that is flexible, HIPAA-compliant and easily accessible.
Security Management Strategies for the CIO



