EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
EGUIDE:
Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.
WHITE PAPER:
This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
EGUIDE:
In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
EGUIDE:
Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
EZINE:
How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
WHITE PAPER:
In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
PODCAST:
In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more.