This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

The Economy of Security: How Physical and Cyber Security Drive Economic Vitality

The following is external content provided as a free resource for blog readers.





What is not as widely considered is the fact that cyber and physical security breaches can have a negative effect on economic vitality. Read this white paper to gain a better understanding of the connection between economic vitality and security.



Request Free!

Driving Economic Vitality with Physical and Cyber Security

The following is external content provided as a free resource for blog readers.





This infographic highlights the connection between economic vitality and security and how both can be achieved.



Request Free!

IDC 2015 Trends: Why CIOs Should Rethink Endpoint Data Protection in the Age of Mobility

The following is external content provided as a free resource for blog readers.





This IDC Technology Spotlight examines the impact of mobile devices on business IT departments, particularly relating to data protection. This document assesses trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.



Request Free!

Stop Password Sprawl with SaaS Single Sign-On via Active Directory

The following is external content provided as a free resource for blog readers.





This paper will discover how IT can improve user productivity, gain visibility and control over SaaS and mobile apps, and stop password sprawl.



Download this white paper to learn:


  • How you can leverage your existing AD to manage app access.

  • Key capabilities to consider when implementing Single Sign-On (SSO).

  • How SSO can boost IT satisfaction and improve security.






Request Free!

Office 365 Single Sign-On: High Availability without High Complexity

The following is external content provided as a free resource for blog readers.





This technology brief will explain why highly reliable SSO between your on-premise network and O365 is crucial, and why that implementation is surprisingly difficult to achieve using the accessory tools provided with O365. Learn the best-in-class approach that allows you to leverage your preexisting multiple-site Active Directory infrastructure to make SSO reliable and simple.



Request Free!

Managing Access to SaaS Applications

The following is external content provided as a free resource for blog readers.







  • First, cloud computing provides easy and dynamic access to information technology.

  • Next, the ecosystem of cloud-based SaaS applications has exploded thanks to cloud computing.

  • Finally, this SaaS ecosystem has helped power an even bigger boom of consumer-friendly mobile devices and apps that access SaaS.


This Essential Guide examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access, and management of SaaS applications while reducing password sprawl. This guide will also review how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and additionally help evaluate the options available on the market.



Request Free!

Top Six Things to Consider with an Identity as a Service Solution (IDaaS) Solution

The following is external content provided as a free resource for blog readers.





After all, they're just trying to ensure the security of your enterprise but they're often burdened with password retrieval activities when they could be focused on more value-added tasks. Because your employee have work to do, and they're suffering from password fatigue, they resort to using passwords that circumvent security practices—inviting hackers into your enterprise data. Solutions to solve the problem are often cumbersome making a complicated problem…well, more complicated.



Is there a better way?



Absolutely: unified identity management with an identity as a service solution (IDaaS).



Download the white paper: Top Six Things to Consider with an Identity as a Service Solution. You'll discover how an IDaaS can help you drive user productivity, enhance IT efficiency, improve security, mitigate risk, and lower total cost of ownership.



Request Free!

Space Weather Outlook February 22, 2015 at 08:46PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-8 2015 February 22 at 6:32 p.m. MST (2015 February 23 0132 UTC) **** SPACE WEATHER OUTLOOK **** Summary For February 16-22 G1 (minor) geomagnetic storms were observed on late on 17 February and again early on 18 February due to high speed solar winds from a negative polarity coronal hole. Outlook For February 23-March 1 No significant space weather is expected through the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

4 Critical Steps to Address Database Vulnerabilities Before You Experience a Devastating Breach

The following is external content provided as a free resource for blog readers.





How can your organization reduce risk by taking a proactive approach to data security? Here are four key steps to take:

  • Understand where - and why - you may be vulnerable

  • Conduct a vulnerability assessment

  • Address your vulnerabilities, measure your improvements and replicate your successes across the entire organization

  • Implement a proactive strategy to protect your data






Request Free!

The Path to Value in the Cloud

The following is external content provided as a free resource for blog readers.





The Path to Value in the Cloud, by Oxford Economics and Windstream, brings together the latest insights, tactics and strategies C-suite respondents are using to make the cloud work for them.



Discover how to gain great business advantages by using the cloud to its full potential.



In this report, you will gain valuable insight into how scale, speed, flexibility, and reliability can all be increased through the cloud. The Path to Value in the Cloud also reveals:

  • Potential for innovation and collaboration through the cloud

  • Successful strategies for cloud migration

  • Proper cloud implementation

  • Security issues and concerns with the cloud






Request Free!

Security in the Age of Enterprise Technology

The following is external content provided as a free resource for blog readers.





Windstream brings you the latest Nemertes report on how to use network security to create more business opportunities and remove stumbling blocks to progress.



The following report will help you gain advantage through proactive use of network security:

  • Enabling business through new services and process improvements

  • Aligning lines of business, risk management, and security to support innovation

  • Keeping risk management functions within IT for greater success






Request Free!

Space Weather Outlook February 15, 2015 at 09:18PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-7 2015 February 15 at 7:06 p.m. MST (2015 February 16 0206 UTC) **** SPACE WEATHER OUTLOOK **** Summary For February 9-15 R1 (Minor) radio blackout conditions were observed on 09 Feb. No G1 or greater geomagnetic storms were observed this period. No S1 or greater solar radiation storms were observed this period. Outlook For February 16-22 There is a chance for R1 (Minor) radio blackouts during the outlook period. No G1 or greater geomagnetic storms are expected during the outlook period. No S1 or greater solar radiation storms are expected during the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Closing the Web App Data Security Gap: Dynamic Data Masking for Web Applications

The following is external content provided as a free resource for blog readers.





Guardium for Applications provides an efficient and cost-effective solution to this growing data security gap. Leveraging dynamic data masking technology applied specifically to web applications, Guardium for Applications addresses the outstanding data security concerns of IT leaders, security professionals and regulatory bodies.



Watch now to learn:

  • What critical business objectives are impacted by the lack of data security controls in web applications

  • Why organizations have been unable to keep pace with changing data security demands for their web applications

  • How dynamic data masking for web applications addresses the outstanding risks

  • How Guardium for Applications provides an efficient and effective method of closing this data security gap






Request Free!

Space Weather Outlook February 08, 2015 at 09:24PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-6 2015 February 8 at 7:12 p.m. MST (2015 February 9 0212 UTC) **** SPACE WEATHER OUTLOOK **** Summary For February 2-8 G1 (Minor) geomagnetic storm conditions were observed on 02 Feb. R1 (Minor) radio blackout conditions were observed on 04 Feb. No S1 or greater solar radiation stroms were observed. Outlook For February 9-15 G1 (Minor) geomagnetic storm conditions are likely on 28 Feb and 01 Mar. No R1 or greater radio blackout conditions are expected. No S1 or greater solar radiation storms are expected. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Authentication Cheat Sheet

The following is external content provided as a free resource for blog readers.






Authentication is the process of verification that an individual or an entity is who it claims to be. Authentication is commonly performed by submitting a user name or ID and one or more items of private information that only a given user should know.


This cheat sheet includes:



  • Authentication General Guidelines

  • Implement Secure Password Recovery Mechanism

  • Store Passwords in a Secure Fashion

  • And much more!


The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics.


OWASP stands for The Open Web Application Security Project.






Request Free!

Clickjacking Defense Cheat Sheet

The following is external content provided as a free resource for blog readers.






The most popular way to defend against Clickjacking is to include some sort of "frame-breaking" functionality which prevents other web pages from framing the site you wish to defend. This cheat sheet will discuss two methods of implementing frame-breaking: first is X-Frame-Options headers (used if the browser supports the functionality); and second is javascript frame-breaking code.


This cheat sheet includes:



  • Defending with X-Frame-Options Response Headers

  • Best-for-now Legacy Browser Frame Breaking Script

  • Non-Working Scripts

  • And much more!


The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics.


OWASP stands for The Open Web Application Security Project.






Request Free!

HTML5 Security Cheat Sheet

The following is external content provided as a free resource for blog readers.






Contents Include:



  • Communication APIs

  • Storage APIs

  • Geolocation

  • Web Workers

  • Sandboxed Frames

  • Offline Applications

  • And much more!


The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics.


OWASP stands for The Open Web Application Security Project.






Request Free!

Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication

The following is external content provided as a free resource for blog readers.





These threats often lead to high-profile losses, rampant media commentary and end user uneasiness.



Download this eBook to understand:

  • Why breaches are occurring;

  • How to protect your organization from hackers with strong and risk-based authentication technology;

  • How to reduce the risk of improper access and fraud without burdening valid users.






Request Free!

Human Vulnerabilities in Our Current Threat Landscape

The following is external content provided as a free resource for blog readers.





Times are changing. Attacks are becoming much more sophisticated and hackers are exploiting human vulnerabilities to gain access to enterprise networks and private information. Employees and end users want to help protect your company's sensitive data, we just need to motivate them as to why they should care. By educating your employees on security best practices and current human vulnerabilities, you can take a step forward to ensuring you're not a part of the many organizations that are breached.



Request Free!

Challenges of Managing Privileged Access on Windows and Servers

The following is external content provided as a free resource for blog readers.





This white paper discusses the goals and challenges of creating a privileged access management program for your Windows desktops and servers in an enterprise environment. Privileged access is a key issue these days, especially on desktops, for which an over-privileged user can be a weapon of destruction on your internal network if they inadvertently download and install malware.



Request Free!

Getting Started with Java EE Security

The following is external content provided as a free resource for blog readers.






These capabilities include authentication, authorization, data integrity and transport security. Other topics covered in this Refcard include Web Module, EJB and Application Client security, securing Java EE Web Services, Hot Tips and more. Highly recommended reading for Java EE users and Java enthusiasts of all kinds.


Contents Include:



  • Security in Java EE Applications

  • Web Module Security

  • EJB Module Security

  • Application Client Security

  • Securing Java EE Web Services

  • Hot Tips and more …


Refcardz are FREE cheat sheets made just for developers. It’s the easy way to stay on top of the newest technologies!






Request Free!

How to Acquire New Customers and Keep Them

The following is external content provided as a free resource for blog readers.





This new reality calls for new techniques to acquire and retain your customers. This Thawte guide offers essential tips and shows how visible security practices such as trust logos and EV SSL can boost site traffic and conversion rates.



Request Free!

New Phishing Tactics and How They Impact Your Business

The following is external content provided as a free resource for blog readers.





Approximately 156 million phishing emails are sent every day, with some 16 million successfully passing through filters. Find out the risks to your business in Thawte's white paper about Phishing tactics.



Request Free!

Die neuesten Phishing-Methoden und ihre Auswirkungen auf Unternehmen

The following is external content provided as a free resource for blog readers.





Täglich werden rund 156 Millionen Phishing E-Mails versandt , von denen ca. 16 Millionen die Sicherheitsfilter passieren. Informieren Sie sich über die Risiken, denen Ihr Unternehmen ausgesetzt ist, in Thawte's neuem Leitfaden über aktuelle Phishing Methoden.



Request Free!

Why SSL Is A Must For Your Business

The following is external content provided as a free resource for blog readers.





Because, once you understand exactly what dark forces you are up against by failing to encrypt your data and that of your customers to the highest levels, and how that failure can have a devastating effect on your online business and reputation, the ‘Must’ will become self-evident. Learn how to keep you and those who transact business with you safe and secure while providing a better online experience, reassuring your customers that you are credible and trustworthy with Thawte's new white paper.



Request Free!

Warum Ihr Unternehmen auf SSL nicht verzichten kann

The following is external content provided as a free resource for blog readers.





Wenn Sie erst einmal einen genauen Einblick gewonnen haben, welche Gefahren im Internet lauern, wenn Sie auf die Verschlüsselung sensibler Daten mit moderner Technik verzichten, und welche verheerenden Folgen dieser Verzicht für Ihren Ruf und Ihr Unternehmen haben kann, liegt die Antwort auf der Hand. In unserem Leitfaden finden Sie sechs Tipps, wie Sie sich selbst und Ihre Geschäftskunden schützen und für Sicherheit sorgen können. Darüber hinaus erfahren Sie, wie Sie eine sichere Website bereitstellen, die Ihren Kunden das Gefühl vermittelt, dass Sie vertrauenswürdig und jederzeit ein zuverlässiger Partner sind.



Request Free!

Top 10 Website Security Myths Revealed

The following is external content provided as a free resource for blog readers.





But with ever-changing threats and ever-evolving defenses comes ever-growing potential for common misconception. To help you cut through the confusion, view our essential guide now and separate website security myth from reality.



Request Free!

Space Weather Outlook February 01, 2015 at 08:43PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-5 2015 February 1 at 6:31 p.m. MST (2015 February 2 0131 UTC) **** SPACE WEATHER OUTLOOK **** Summary For January 26-February 1 R1 (Minor) radio blackouts were observed on 26, 28, 29, and 30 January. No S1 (Minor) or greater solar radiation storms were observed. A G1 (Minor) geomagnetic storm was observed on 01 February. Outlook For February 2-8 R1 (Minor) or greater radio blackouts are likely through 08 February. There is a slight chance for an S1 (minor) or greater radiation storm through 08 February. G1 (minor) or greater geomagnetic storms are expeced on 02 February, with a chance extending through 04 February. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Narrowing the Security Gap with Automated Configuration Assessment

The following is external content provided as a free resource for blog readers.





This guide describes internal risks to IT security and three best practices to control incorrect configurations. Critical components to this include automation of assessments and prioritization of risks.



Request Free!