White Papers: Security

Cyber security is an ever-moving target, particularly as the enterprise’s perimeter becomes more flexible in the mobile era and the threats evolve. Here we offer papers to help the IT security professional.

Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

Is Your Remediation Strategy Working For You? Deciding which vulnerabilities to remediate is a daunting task. In a perfect world, all vulnerabilities would be remediated as discovered. But unfortunately, that doesn’t happen in the real world. Reality necessitates prioritization, but how can we measure the quality of prioritization? There are a number of remediation strategies […]

Prioritization to Prediction: Measuring What Matters

Kenna Security in partnership with the Cyentia Institute has recently launched its rioritization to Prediction Report, Volume 4: Measuring What Matters in remediation. In collaboration with the Cyentia Institute, this research takes a look at qualitative survey data on vulnerability management practices with quantitative measures of actual remediation performance to reveal what contributes to high-performing […]

5 Arguments to Justify Your Identity Spend

Spending on secure infrastructure is vital to protect any company’s plans for revenue generation and business expansion, but all execs are faced with competing revenue-generating priorities across the business. When it comes to identity spend—which today make up less than 9% of the average security budget, despite its potential to prevent the 80% of data […]

Key Methods for Managing Complex Database Environments

As database infrastructures become more complex, you must adapt and learn to balance key business metrics, understand new technology challenges and find the right tools to  monitor and manage your database environment. This white paper describes key methods to successfully manage your complex database envrionment. A slow relational database can substantially impact the performance of […]

An Introduction to Advanced Malware and How it Avoids Detection

Despite millions being spent on security products, organizations are still suffering from advanced malware attacks and data breaches. Attacks continue to succeed because the malware has been engineered to detect and evade “advanced” or “next-generation” tools like firewalls, sandboxes, and IPS. Organizations interested in safeguarding their data need to understand how evasive malware behaves and […]

Mitigating Business Risk and Driving Business Value with Behaviour-Based AI Security

Artificial intelligence (AI) has emerged as a prominent technology in cybersecurity applications. This IDC Vendor Spotlight examines the advances in and recent uses of AI in cybersecurity as well as the role of Lastline in this important market.  The report offers an evaluation of AI-powered security capabilities that is required to understand what the technology […]

Protecting GPS Systems Against Spoofing and Jamming Threats

Critical infrastructure sectors such as wireline and wireless net­works, power grids, data centers and emergency services are now highly dependent on PNT information delivered by GPS. This brochures describes how Microsemi’s BlueSky GNSS Firewall solves the problem of protecting already deployed systems by providing a cost-effective overlay solution installed between existing GPS antennas and GPS […]

GNSS Security for PNT Applications

To guide operators of Critical Infrastructure sectors such as communications, energy, transportation, emergency services, financial services, and cloud data centers, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) have described a number of steps that can be taken to mitigate outages and disruptions with GPS reception, thus improving its PNT (position, navigation, […]

Prioritization to Prediction Measuring What Matters

What matters in vulnerability management (VM)? What enables some programs to achieve higher levels of performance and greater success than others? Is it what they say (e.g., policies) or the products and tools with which they play? Does everything hinge on what they do or how they do it? Is it all about what they […]

Go Beyond Application Vulnerability Correlation

What It Takes to Move to Risk-Based Application. Vulnerability Management In the current application software development life cycle, using more than one  application security testing tool is a necessity, due to their different strengths and  weaknesses. Gartner sums up the need for multiple testing tools extremely well when it says, “Some vulnerabilities can be found […]