Headed for a big meeting at a hotel or other offsite venue? Security is either going to help everything run smoothly, or be seen as the department that makes everything more complicated. Here are tips for protecting confidential presentations, employees, assets and more at any offsite meeting. William Besse, Vice President of Consulting and Investigations with security firm Andrews International, and physical security consultant Dan Finger provided their suggestions.
Joan Goodchild, Senior Editor , CSO, February 01, 2012
While in the process of separating from its parent company, a US$1.6 billion global hospitality company turned to Protiviti to analyze, plan and design effective and efficient identity management processes and supporting solutions.
For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the DDoS attack landscape is changing. Read the report to learn more.
In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence point for other endpoint management and control functions.
The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing the need to combine dynamic and static testing capabilities.
This white paper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program's maturity.
As bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. Is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?
Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.