Cyber Security

Best Practices for IT Asset Discovery

Asset discovery has risen to become a critical aspect of managing and securing government IT environments thanks to new mandates, data-centre consolidation initiatives, and security requirements. Given the increasing need to know precisely what’s within your environment, where do you start? This free white paper maps out the top eight “must-have” aspects of asset discovery […]

Good Practice Guide 13 – Log & Event Manager

Free white paper from SolarWinds The Good Practice Guide 13 (GPG13) is designed to establish security assurance guidelines that businesses can implement to safely and effectively handle confidential data and reduce security risks. Log & Event Manager (LEM) is an award-winning SIEM solution (Best SIEM Solution – SC Awards Europe 2015) that helps organisations become […]

IT Consolidation – What’s Next for Government Modernisation Initiatives?

Free white paper from SolarWinds IT consolidation has been a high-priority government initiative for many years. Yet today, a range of mandates are serving as catalysts for increased widespread data centre consolidations, virtualisation initiatives, and more. Agencies that have already made significant IT consolidation progress are experiencing lower costs, more efficiency, greater availability, and enhanced […]

There is no silver bullet

The security landscape changed dramatically with the maturation of crypto-ransomware in 2014. Not only did this new type of malware bring about a more lucrative business model for attackers, it also spurred the adoption of many so-called ‘next-gen’ endpoint security techniques. While these techniques bring impressive new capabilities to the fight against malware, there is […]

Beyond Next-gen: Defining Future-ready Endpoint Security

ESG conducted market research to explore how organizations employ advanced endpoint security controls. This research revealed that a continuum is at play, with most organizations that ESG interviewed starting with advanced preventative controls to augment their antivirus technology and a smaller number of companies, typically those that are well resourced, employing advanced detection and response […]

The Top 5 Myths of Next-Gen Endpoint Protection

‘Next-generation’ endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword, but finding a solution which is effective in protecting their organization from an increasingly agile and determined online enemy. Multiple […]

Boosting IaaS and PaaS Security in the Public Cloud

Recently, Intel IT has developed a public cloud infrastructure-as-a-service (IaaS) security strategy, which also encompasses platform-as-a-service (PaaS) security. This strategy, complemented by a comprehensive IaaS security architecture, enables Intel business units to use public cloud IaaS to accelerate innovation, and time to market while cutting costs. Intel have also moved some of their IT services […]

Getting Started with Advanced Analytics

In IT circles, talk about big data has shifted from hype and initial skepticism to a more considered conversation focused on using new and emerging technologies to capitalize on data to create business value. No longer are people asking, “Is there value in big data?” Instead, they are asking, “How can I use data analytics […]


  • Favorite list is empty.
FavoriteLoadingClear favorites

Your favorite posts saved to your browsers cookies. If you clear cookies also favorite posts will be deleted.