Information Security Resources
Here are some new security white papers I'd like to share with you - I hope you'll enjoy them.
7 Shortcuts to Losing Your Data (and Probably Your Job)
This tongue in cheek white paper explores data loss from a contrarian point of view - exploring the top 7 shortcuts you can take to ensure that you lose your data.
Download PDF: http://bit.ly/hBDpIK
Top Eight Identity & Access Management Challenges with SaaS Applications
This white paper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Download PDF: http://bit.ly/geZi1S
The Silent Danger of Clever Malware
This paper discusses the history and progression of the modern Trojan attack. It explores the methodology used by hackers in selecting a target and developing a compelling attack and cites several examples of some successful targeted Trojans.
Download PDF: http://bit.ly/e4QHCc
Vulnerability Management - Assess, Prioritize, Remediate, Repeat
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Download PDF: http://bit.ly/i35fAH
No comments:
Post a Comment