REGISTER

White Papers

MetricStream

As Internet-based businesses build and scale their operations, the need to protect their user's information and their own IT infrastructure becomes increasingly important. Information security is a big concern as recent high profile breaches at leading internet companies have demonstrated, and many Internet-based businesses see the value of using technology to build and sustain robust information security and IT risk management programs that protect them from emerging cyber threats.

Voltage

Big Data is an exciting concept and emerging set of technologies that hold seemingly unlimited promise to enable organizations to gain new analytic insights and operational efficiencies. It is a unique architecture that enables low-cost, high-speed, parallel processing of huge data sets of structured and unstructured data.

Voltage WP

Generating data for test and development environments presents serious challenges for enterprise security and risk management. When data is copied from production databases and used directly for test/development, large volumes of private data accumulate on unprotected servers and workstations. The use of outsourced and offshore QA and development services further increases the risks. An alarming number of data breaches, along with complex regulatory compliance requirements, highlight the need to de-identify sensitive data when moving from production to test, development, and training environments.

Seagate

For many CIOs and IT managers, the benefits of moving to the cloud—increased efficiency, reduced cost, excellent scalability, pay-as-you-go pricing, the latest technology without the capital expense—are offset by concerns about security and service quality.

MetricStream

The challenge of enterprise risk management programs for many organizations has always been how to quantify "value" and effectively harness data across the enterprise. Risk management consultants believe there is now a solution in emerging data mining and analytic modelling technology that effectively turns "data" into true risk intelligence.

Data Sheet

GRC, by definition, involves bringing together governance, risk and compliance disciplines from across an increasingly complex, extended enterprise with deep interlocks to customer and supplier eco-systems. While it's not realistic to expect organizations to converge on a common set of GRC processes across this complex landscape, there is huge value in taking a federated approach to GRC that leverages the common risk elements from each business unit, IT and security teams, and management of third parties.

Prime Factors

Prime Factors spoke with some of the best minds in data security to get their take on what kinds of data encryption management problems customers run into. They identified several common threats to key management and secure data access which they see over and over again, That advice is condensed and organized here for professionals responsible for effectively protecting sensitive data in their enterprises.

Voltage WP

Hadoop is a unique architecture designed to enable organizations to gain new analytic insights and operational efficiencies through the use of multiple standard, low-cost, high-speed, parallel processing nodes operating on very large sets of data. The resulting flexibility, performance and scalability are unprecedented. But data security was not the primary design goal.

Coalfire WP

SEC Cyber Risk Guidance Overview and SEC Cyber Risk Disclosure Issues.

Prime Factors

PINs (Personal Identification Numbers) are those ubiquitous numbers we all know. They are used to authenticate cardholders, protecting personal accounts and issuers from fraudulent activities. The technology used in the creation, use, and management of PINs can be overwhelming and confusing.

Data Sheet

Streamline and accelerate threat and vulnerability lifecycle management across all assets, including those in cloud and virtualized environments.

Article

What to do: Be curious, ask questions about how risk is measured, educate yourself and your teams, and reflect back to your stakeholders on how IT components figure into the risk equation.

Prime Factors

Practices for IT development and quality assurance have foundations that extend much further back than the original invention of information technology.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top