As more companies adopt better encryption practices, cyber criminals are turning to SSL/TLS vulnerabilities to deliver malicious attacks. Read More ▶ |
|
| White Paper: Citrix Systems Is the European GDPR going to change your data security strategy? Learn more about the requirements of GDPR and how they can be addressed with integrated Citrix technologies for contextual access, network security, application security, data security, and analytics and insights. Read More ▶ | Important criteria to consider when evaluating or choosing a database security solution include customization capabilities, reporting features, database discovery, vulnerability management, and database auditing, among others. Here's how IBM Guardium and Imperva SecureSphere Database Security stack up. Read More ▶ |
| Jason Brvenik for a Security Slap Shot on the need for security leaders to challenge dogma and replace outsized assumptions with evidence and better action. Read More ▶ |
| | | Understanding how hybrid cloud economics changes behavior – snapshotting in particular – and how that results in unintended security exposure, both on-prem and in the cloud. But first, an easy to understand analogy about home ownership and how that sprawl leads to security issues as well and then dovetailing into the hybrid data center. Read More ▶ |
| Black Hat 2017 was a busy show, highlighting a healthy cybersecurity industry. But there was too much hype, misunderstanding, and proprietary agendas. Read More ▶ |
| White Paper: Citrix Systems ESG shares the experiences of three Citrix customers using XenApp and XenDesktop to virtualize Skype for Business. Over the last few years, these customers have enjoyed improved collaboration, communication and productivity by deploying Skype for Business as a secure, virtual unified communications tool. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|