This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.
CyberArk’s 2015 Global Advanced Threat Landscape Survey
CyberArk’s 2015 Global Advanced Threat Landscape Survey is the ninth in a series of annual surveys that focus on identifying global cyber security trends..
View whitepaperDefending the Internet of Things: Identity at the Core of Security
Attacks on traditional IT systems have resulted in massive loss of money, privacy and intellectual property. Even worse, attacks on the Internet of Things (IoT) potentially threaten our safety.
View whitepaperCybersecurity - You're Already Compromised
Each year, IT faces an increase in targeted cyberattacks, more sophisticated and prepared attackers, a significant increase in DDoS attacks, and a growing number of hacker toolkits and black market trading sites for stolen data.
View whitepaperCyberArk’s 2015 Global Advanced Threat Landscape Survey
CyberArk’s 2015 Global Advanced Threat Landscape Survey is the ninth in a series of annual surveys that focus on identifying global cyber security trends..
Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.
SecureAuth takes Adaptive Access Control to the Next Level with Behavioral Biometrics
With more authentication options than any other vendor, SecureAuth is uniquely positioned to inspect authentication attempts without impacting users. Read more about it in SecureAuth's 451 report.
OneLogin Receives Highest Score Among All Vendors in Current Offering Category
OneLogin cited as Leader, and was noted as being among the “nine most significant SaaS providers in the category” evaluated in The Forrester Wave™: B2E Cloud IAM, Q2 2015.
The Ciso View on Improving Privileged Access Controls - A special Report from CyberArk
What do the CISO and security team need to successfully improve privileged access controls? This report provides specific guidance on the team, techniques, and tools needed to drive this initiative..
Why Ransomware Is More Than a Royal Pain, and What You Can Do About It
Ransomware has emerged as a significant and costly threat to corporate data. In this whitepaper, learn how Lumension solutions can help provide essential protection against the latest threats.
Safeguarding the Internet: Level 3 Botnet Research Report
In this whitepaper, we take a closer look at botnets that are used specifically to deploy malware (such as the recently uncovered SSHPsychos and PoSeidon) to gain insights into complex threat models and protection options.
Digital Signatures for the Cloud: a B2C Case Study
Learn about the components needed to build an end-to-end digital signature solution in-house, including PDF document workflows and document signing certificates.
SC eBooks are independent, editorially driven products, sometimes underwritten by sponsors, that offer in-depth analysis of critical areas of interest to our readers. These comprehensive reports provide insights from industry experts specializing in the various aspects of data security, and hands-on analysis by CISOs of companies addressing these challenges on a daily basis.
SC Magazine eBook on Application Security (2015)
This latest ebook from SC Magazine looks at actions companies can take to shore up their applications defenses and enhance their testing.
SC Magazine eBook on Retail Retaliation (2015)
In the Retail Retaliation eBook, SC Magazine explores what the retail industry is doing to defend against these continual attacks and recommends actions you should take to avoid retail fraud.