This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

Reduce Your Open Source Security Risk: Strategies, Tactics, and Tools

The following is external content provided as a free resource for blog readers.

There’s no doubt that open source software (OSS) is here to stay, but that doesn’t mean that developers can feel free to use all and any open source software components with no thought to the vulnerabilities and security issues they may introduce into development projects. The fact is, there’s no such thing as bulletproof, bug-free, automatically license compliant, and easily auditable software. Not in the open source world and not in the commercial off the shelf (COTS) world. So, it’s incumbent on developers, project team leaders, IT managers, CIOs and CTOs to ensure that there are sound strategies and tactics making it easy to acquire, distribute, use, monitor, analyze, and keep track of open source software to reduce the risk of vulnerable and buggy software and applications to an absolute minimum.



Request Free!

Defend Against Injection-based Attacks

The following is external content provided as a free resource for blog readers.

Security weaknesses today occur most often in software that is accessible from a user’s desktop, tablet, or mobile device. Web-based applications, network-enabled or controlled devices, and widely-used mobile software are the applications most targeted. This is followed by infrastructure applications such as operating systems, web servers, and browser-based software including plug-ins and extensions. The cause of these weaknesses typically stems from the developer not anticipating how the software could be misused and made to perform actions it wasn’t designed to do. The root problem is often a lack of secure input handling to block any application input or content that has not first been scanned for and had any harmful aspects filtered out. 



Request Free!

Relatrio de defesa contra ataques cibernticos 2015 - Resumo executivo (Um relatrio do CyberEdge Group)

The following is external content provided as a free resource for blog readers.
O segundo relatório anual de defesa contra ataques cibernéticos do CyberEdge Group oferece uma visão aprofundada sobre como os profissionais de segurança de TI percebem ataques cibernéticos e planejam defender-se deles. Com base em uma pesquisa feita com mais de 800 tomadores de decisÕes e profissionais de segurança de TI, realizada em dezembro de 2014, o relatório apresenta inúmeras observações que as equipes de segurança de TI podem usar para entender melhor como suas percepções, prioridades e posturas de segurança se comparam ás de seus colegas de profissão.

Request Free!

Hyper-Convergence Extended Beyond the Hype: To the Branch

The following is external content provided as a free resource for blog readers.
On this webcast, you will learn how you can:
  • Reduce Company Risk of data loss without compromising application performance or availability at the branch.
  • Increase Operational Agility and Gain a Competitive Advantage via instant deployment of new applications and services to remote sites.
  • Deliver Superior Continuity of Operations at Remote Sites with instant data recovery.
  • Slash the Operational Costs with a streamlined and standardized hyper-converged solution that extends your data center to the edges of your enterprise.


Request Free!

Rethink Branch IT: Think Zero Branch IT

The following is external content provided as a free resource for blog readers.
As the number of branch and remote locations increases, companies find themselves deploying more and more infrastructure, and spending increasing amounts of IT budget to deliver applications and data reliably and efficiently. Valuable company data stored in these locations is often left unprotected and frequently stored on servers jammed into closets, corners and hallways due to limited space. Without qualified IT staff on site to manage servers, storage and backup, provisioning new services, resolving application performance issues and recovering from outages can take days or even weeks, directly impacting business productivity and ultimately business results. Riverbed® offers a new approach – zero branch IT.

Request Free!

Defender as propriedades web mveis ocultas

The following is external content provided as a free resource for blog readers.
NetScaler contribui para esta camada invisìvel de infra-estrutura para realizar e comunicar, melhorando a segurança, bem como a qualidade do serviço. E atravès da integração com XenMobile, vocé pode oferecer um maior apoio e uma melhor experiência para os usuários móveis.

Request Free!

Essentials of Online Payment Security and Fraud Prevention: Free eBook! (a $29.99 value)

The following is external content provided as a free resource for blog readers.
This eBook focuses on the prevention of fraud for the card-not-present transaction. The payment process, fraud schemes, and fraud techniques will all focus on these types of transactions ahead.
  • Reveals the top 45 fraud prevention techniques
  • Uniquely focuses on eCommerce fraud essentials
  • Provides the basic concepts around CNP payments and the ways fraud is perpetrated
If you do business online, you know fraud is a part of doing business. Essentials of On-line Payment Security and Fraud Prevention equips you to prevent fraud in the CNP space.

Request Free!

Defender las propiedades web de las amenazas modernas con Citrix NetScaler

The following is external content provided as a free resource for blog readers.
Este white paper analiza los retos de la defensa de propiedades web modernas de las amenazas actuales. En él se explica cómo el controlador de entrega de aplicaciones (ADC) Citrix® NetScaler® complementa la protección contra malware avanzado y otros productos de seguridad de alto perfil para proporcionar una solución ideal para defenderse contra las nuevas amenazas y proteger más objetivos.

Request Free!

Citrix NetScaler: Una poderosa defensa contra los ataques de denegacin de servicio

The following is external content provided as a free resource for blog readers.
Este white paper analiza el panorama actual de DoS y examina los enfoques comunes para hacer frente a las modernas amenaza DoS. En él se explica cómo el controlador de entrega de aplicaciones Citrix® NetScaler® (ADC) ofrece una robusta pero asequible base para las defensas de DoS de una organización.

Request Free!

IT Guide to Mac Backup for Business

The following is external content provided as a free resource for blog readers.
Protecting Mac devices presents a new challenge for IT, due to the inherent mobility, cloud-enthusiastic and app-centric behavior of end users. Follow these 8 considerations for developing a Mac laptop backup plan for your business that considers:
  • Performance
  • What really works for Macs
  • Data security
  • Device refresh
Get this guide and more easily incorporate Macs in your organization's data protection plans.

Request Free!

What's Missing From Your BYOD Strategy?

The following is external content provided as a free resource for blog readers.
Mobile device programs play an important role in enabling enterprise productivity. However, Mobile Device Management (MDM) solutions have led to poor user experience, privacy concerns, security risks and ballooning costs. Enterprise Mobility Management (EMM) is a far better approach to managing personal devices in a corporate setting at scale.

Download this white paper to learn more!

Request Free!

Space Weather Outlook January 25, 2016 at 02:23AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-4 2016 January 25 at 12:09 a.m. MST (2016 January 25 0709 UTC) **** SPACE WEATHER OUTLOOK **** Summary For January 18-24 No radio blackouts or solar radiation storms were observed during the summary period. G1 (Minor) geomagnetic storm levels occurred on 20-21 January with G2 (Moderate) geomagnetic storming on 21 January due to activity associated with a coronal mass ejection from 14 January. Outlook For January 25-31 No radio blackouts, solar radiation storms or geomagnetic storms are expected for the forecast period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Four Top Cyber Crime Trends

The following is external content provided as a free resource for blog readers.
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents. Learn more about:
  • “Onion-layered” security incidents
  • Ransomware attacks
  • Attacks from inside an organization
  • Greater management awareness of the need to address security threats proactively


Request Free!

Battling Security Threats From Within Your Organization

The following is external content provided as a free resource for blog readers.
This report outlines the challenge of insider threats - who they are, the damage and financial loss they can cause, and what organizations can do to protect themselves.

Request Free!

2015 Cyber Security Intelligence Index

The following is external content provided as a free resource for blog readers.
The annual Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year. Our goal is to help you better understand the current threat landscape by offering a detailed look at the volume of attacks, the industries most affected, the most prevalent types of attacks and attackers, and the key factors enabling them.

Request Free!

Protect Your Critical Assets With Identity Governance

The following is external content provided as a free resource for blog readers.
This white paper explores the advantages of using a robust and integrated identity governance and administration solution as a vital security control to help protect sensitive enterprise data and critical assets across an organization's broad spectrum of entry points.

Request Free!

How Identity Governance Became a Key Compliance And Risk Control

The following is external content provided as a free resource for blog readers.
Identity governance enables organizations to manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security.

Download this white paper to learn more!

Request Free!

Forrester Total Economic Impact (TEI) Study of IBM Security Guardium

The following is external content provided as a free resource for blog readers.
In September 2015, IBM commissioned Forrester Research consulting to conduct a Total Economic Impact (TEI) study to examine the potential return on investment (ROI) that organizations may realize by deploying IBM Security Guardium. The study uncovered that organizations achieve cost and risk reductions while increasing productivity and tactical efficiencies from implementing IBM Security Guardium. Read the study to learn more.

Request Free!

Top Tips for Securing Big Data Environments

The following is external content provided as a free resource for blog readers.
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments.

Request Free!

Strategy Considerations for Building a Security Operations Center

The following is external content provided as a free resource for blog readers.
This white paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC. It details:
  • How to assess the maturity and capabilities of your existing security operations
  • Five essential functions that enterprise SOCs should address
  • The myriad of considerations necessary to realize each function
  • Broad capabilities that consulting partners can bring to the strategy and implementation of your enterprise SOC
  • How you can jumpstart your enterprise SOC development efforts


Request Free!

2015 Cost of Data Breach Study: United States

The following is external content provided as a free resource for blog readers.
What truly affects the cost of a data breach? Ponemon Institute's latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.

Request Free!

2015 Gartner Group Magic Quadrant on Managed Security Services

The following is external content provided as a free resource for blog readers.
Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements.

Request Free!

IBM Security Intelligence Client Study

The following is external content provided as a free resource for blog readers.
This report from Ponemon Institute provides quantitative statics on the required time, skills and the typical workflow IT security teams utilize to investigate suspected network attacks, security breaches and recognized data loss scenarios. Over 190 IBM Security QRadar clients were interviewed for this report.

Request Free!

The Case for Security Intelligence Services, Hosted From the Cloud

The following is external content provided as a free resource for blog readers.
This white paper explores the advantages of using a robust security intelligence solution, delivered from the IBM cloud and monitored by IBM service professionals. It will look at how IBM® Security Intelligence on Cloud, a security-as-a-service offering, enables organizations to stay ahead of the latest threats with industry-leading technology and trusted IBM expertise— resulting in greater flexibility, cost effectiveness and peace of mind.

Request Free!

Success That Scales: Delivering Security Intelligence for Organizations of All Sizes

The following is external content provided as a free resource for blog readers.
Like kids in a candy store, cybercriminals can't wait to get their hands on your company's confidential information. You need security tools that detect the latest threats before they can cause damage. This paper explains how a security intelligence platform can offer you immediate protection and help you scale for the future. In addition to helpful illustrations, the paper includes short case studies from 3 organizations.

Request Free!

Secure the Data That Powers Your Business

The following is external content provided as a free resource for blog readers.
Escalating threats to sensitive data and growing compliance mandates are driving organizations to rethink their data protection strategies. In light of these requirements, traditional approaches to data protection can't keep up.

For effective data protection, IBM offers organizations data security solutions to meet a wide range of data security and protection requirements – from basic compliance to comprehensive data protection – in a cost-effective, scalable way.

Read this solution brief to discover the newest capabilities in IBM Security Guardium to analyze threats, control and protect sensitive data and adapt to changes to keep up with emerging data security requirements.

Request Free!

Informe sobre defensa frente a ciberamenazas 2015. Resumen ejecutivo (Un informe de CyberEdge Group)

The following is external content provided as a free resource for blog readers.
El segundo informe anual sobre defensa frente a ciberamenazas de CyberEdge Group proporciona una visión detallada de cómo los profesionales de seguridad informática perciben las amenazas y planean defenderse de ellas. El informe, que se basa en una encuesta realizada en diciembre de 2014 a más de 800 profesionales y responsables de la toma de decisiones de seguridad informática, aporta innumerables datos relevantes de los que los equipos de seguridad informática se pueden valer para descubrir mejor en qué se diferencian sus percepciones, prioridades y estado de seguridad de los de sus homólogos.

Request Free!

Defender as propriedades web mveis ocultas

The following is external content provided as a free resource for blog readers.
NetScaler contribui para esta camada invisível de infra-estrutura para realizar e comunicar, melhorando a segurança, bem como a qualidade do serviço. E através da integração com XenMobile, você pode oferecer um maior apoio e uma melhor experiência para os usuários móveis.

Request Free!

Relatrio de defesa contra ataques cibernticos 2015 - Resumo executivo (Um relatrio do CyberEdge Group)

The following is external content provided as a free resource for blog readers.
O segundo relatório anual de defesa contra ataques cibernéticos do CyberEdge Group oferece uma visão aprofundada sobre como os profissionais de segurança de TI percebem ataques cibernéticos e planejam defender-se deles. Com base em uma pesquisa feita com mais de 800 tomadores de decisões e profissionais de segurança de TI, realizada em dezembro de 2014, o relatório apresenta inúmeras observações que as equipes de segurança de TI podem usar para entender melhor como suas percepções, prioridades e posturas de segurança se comparam às de seus colegas de profissão.

Request Free!

Space Weather Outlook January 17, 2016 at 08:39PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-3 2016 January 17 at 6:27 p.m. MST (2016 January 18 0127 UTC) **** SPACE WEATHER OUTLOOK **** Summary For January 11-17 No geomagnetic storms, radio blackouts or solar radiation storms were observed during the summary period. Outlook For January 18-24 No geomagnetic storms, radio blackouts or solar radiation storms are expected through the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

How to Architect and Automate the Next-Gen Datacenter with Software-Defined Networking

The following is external content provided as a free resource for blog readers.
With this webinar, you will learn:
  • Primary drivers for software defined networking
  • Network virtualization - definition, use cases, and different models of virtual networks including pure overlays and integrated physical + virtual models
  • Key implications of network virtualization for network services such as ADCs and firewalls
  • Citrix NetScaler solutions for multi-tenant virtual networks


Request Free!

SDN 101: An Introduction to Software Defined Networking

The following is external content provided as a free resource for blog readers.
SDN has quickly become one of the hottest trends in IT. But not all SDN solutions offer real software-defined functionality. As more enterprises consider SDN, they want to know, “What is SDN? And what are the real benefits?” If you're ready to explore the advantages of SDN, and want to know how it should be implemented within your enterprise, start by reading our introductory white paper.

Request Free!

Best Practices in Virtual Desktop Infrastructure Implementation

The following is external content provided as a free resource for blog readers.
Why then isn't VDI more widespread among health systems and hospitals? The healthcare industry is slow to adopt cutting-edge information technology, mainly based on concerns about health data security and privacy. This guide provides insight into the various benefits and challenges associated with VDI implementation and ultimately culminates in an overview of the many use cases for VDI in healthcare. VDI is not the solution for all practices, but for many it is enabling higher efficiency and faster innovation.

Request Free!

Pure Storage Provided Significant Capital And Operational Savings

The following is external content provided as a free resource for blog readers.
Forrester Research's Total Economic Impact (TEI) study on how Healthcare organizations are seeing huge cost savings and increased clinician productivity using Pure Storage in their environments. This commissioned study conducted by Forrester Consulting on behalf of Pure Storage covers:
  • Forrester Research TEI framework and methodology
  • Analysis of key drivers for healthcare providers and their quantified impact
  • Summary impact of Pure Storage on these provider environments


Request Free!

The Business Case for Protecting Against Advance Attacks: Demonstrating the ROI of FireEye as a Service to Non-Technical Executives

The following is external content provided as a free resource for blog readers.
You understand the intricacies of today's threat landscape, and the difficulties your organization faces when attempting to prevent, investigate and remediate targeted attacks, but how do you explain that difficulty, and subsequent cost, to senior leadership? Often the best tactic is to speak to them in a language that they understand: money.

Request Free!

Out Of Pocket: A Comprehensive Mobile Threat Assessment

The following is external content provided as a free resource for blog readers.
Based on analysis of seven million mobile apps on both Android and iOS platforms from January to October 2014, our researchers discovered a 500% increase in the number of mobile malware designed to steal financial data.

Researchers reviewed popular apps with more than 50,000 downloads to assess their exposure to a common vulnerability, and found that 31% of them were exposed to it. Of those, 18% were in sensitive categories including finance, medical, communication, shopping, health, and productivity.

Request Free!

Space Weather Outlook January 10, 2016 at 07:28PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-2 2016 January 10 at 5:10 p.m. MST (2016 January 11 0010 UTC) **** SPACE WEATHER OUTLOOK **** Summary For January 4-10 G1 (Minor) geomagnetic storms were observed on 06 January due to effects from a geoeffective, positive polarity coronal hole high speed stream (CH HSS). No radio blackouts were observed during the summary period. No solar radiation storm were observed during the summary period. Outlook For January 11-17 G1 (Minor) geomagnetic storms are likely on 12 January due to effects from a geoeffective, negative polarity CH HSS. R1 (Minor) radio blackouts are possible from 15-17 January after the return of old active Region 2473 (S21, L=334). No solar radiation storms are expected through the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Self-Assessment - Protecting Yourself From Advanced Attacks: What's Your Next Move?

The following is external content provided as a free resource for blog readers.
The answer depends on your internal capabilities, existing investments, your tolerance for risk and many other factors. Our quick self-assessment will help you navigate to your next big decision.

Answer a few quick questions to help figure out your next move.

By submitting your information, you agree to receive email communications from FireEye. Understand that you can unsubscribe at any time.

Request Free!

The Numbers Game: How Many Alerts is too Many to Handle?

The following is external content provided as a free resource for blog readers.
In a recent analysis of threat management, FireEye learned that large enterprise companies rely on security personnel to fulfill multiple roles and responsibilities – an expectation that can prove disastrous when it comes to finding and escalating a critical alert.

This special report is based on a worldwide survey conducted with large enterprises. The report contains statistics that clearly show security personnel at all levels face the unenviable task of wading through too much data, false alarms and duplicate alerts – which means the real risk isn't only that attackers will breach a network … it's that it won't be discovered and dealt with in time. While security teams comb through mounds of noisy data and cull out many alerts, too many still need to be addressed at the upper levels, making an already cumbersome process virtually impossible to manage.

Request Free!

Space Weather Outlook January 03, 2016 at 08:33PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-1 2016 January 3 at 6:20 p.m. MST (2016 January 4 0120 UTC) **** SPACE WEATHER OUTLOOK **** Summary For December 28-January 3 G1 (Minor) and G2 (Moderate) geomagnetic storms were observed on 31 December and 01 January due to effects from a 28 December coronal mass ejection (CME). R1 (Minor) radio blackouts were observed on 28 December and 02 January due to flare activity from active Region 2473. An S1 (Minor) Solar Radiation storm was observed on 02 January associated with significant flare activity from Region 2473. Outlook For January 4-10 G1 (Minor) geomagnetic storms are likely on 06 January due to effects from a geoeffective, positive polarity coronal hole high speed stream. No radio blackouts are expected through the outlook period. No solar radiation storms are expected through the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.