Skip Links

Network World

Resource Library

  • eGuide: New Era of Identity Management
    Source: RSA Security Inc
    eGuide: With humans now the primary attack surface for cybercriminals, identity and access management (IAM) has entered a new era. As one analyst puts it, "It's important to realize that in a world of perpetual mobility and massive amounts of data, identity is the security perimeter. The sooner we realize this, the better we will be at mitigating risk and protecting valuable digital assets."

    This eGuide from CSO and Network World discusses why enterprise organizations must make identity management an essential component of business processes and security, how security requirements are driving identity management, and where IAM is headed.
  • When Cryptors Attack: Timeline of a Ransomware Infection
    Source: Kaspersky Lab Inc
    White Paper: The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.
  • Top 6 Things Small Businesses Need to Know About Cybersecurity
    Source: Kaspersky Lab Inc
    White Paper: Small businesses often lack the budget, staff, and sophistication to assemble strong defenses, making them an easy target where the chances of thieves getting caught is much lower. And no company is "too small to be worthwhile" for the bad guys. Making sure your business is adequately protected can seem like an overwhelming undertaking. We've compiled a list of the top things startups and small businesses need to know about cybersecurity to help you get started.
  • Business Perception of IT Security: In the Face of an Inevitable Compromise
    Source: Kaspersky Lab Inc
    White Paper: IT Security Risks Report 2016 for North America: The security industry finds itself at the point when traditional solutions do not cover some new threats and businesses are still uncertain about 'beyond-prevention' methods like staff training, security audits and consulting. These new methods of protection are strikingly different from the old ones, and may initially seem a bit more difficult to deploy and measure results. So what's the right approach?
  • Citrix Customers Put Google Chromebooks to Work
    Source: Citrix-Google
    Webcast: Work is no longer where we go in the morning, work is what we do - what we get done. Watch this Citrix and Google webcast to learn how you can implement a secure, fast, simple and sharable solution within your organization today.
  • Whodunit: The Mystery of the APT
    Source: Kaspersky Lab Inc
    White Paper: Cybercriminals can be certain about a few things.
    -Most companies store their important data on their networks. Patents, innovative designs, customer information, and confidential data - it's all there.
    -Intellectual property is highly valuable, making it the number one thing cybercriminals target.
    -Many companies don't understand the latest security practices and don't install the latest patches on their security products, leaving an open door for cybercriminals to steal what matters most.
    -You don't have to be a large government agency or an energy company to be an attractive target. Every company, no matter how small, has sensitive data that can be stolen and re-sold.
    -This is a growing and lucrative market.
  • Realize the Full Potential of VDI
    Source: Citrix Systems
    White Paper: Companies are often challenged to implement new solutions or deliver enterprise-level services using smaller IT teams and lower budgets. Nutanix InstantON VDI for Citrix simplifies and accelerates virtual desktop (VDI) deployments for companies of any size. If you are new to VDI or looking for a way to grow your VDI footprint, Nutanix and Citrix deliver better end-user performance at an affordable price point.
  • Citrix XenDesktop and XenApp Runs on Nutanix Acropolis
    Source: Citrix Systems
    White Paper: Learn about how Nutanix hyperconverged infrastructure (HCI)-built on Nutanix Acropolis-and with Citrix XenApp and XenDesktop provide a complete, fully supported solution for application and desktop virtualization that enhances enterprise security, enables workforce mobility, and lowers the cost and complexity of application, desktop, and infrastructure management by as much as 70%.
  • Citrix XenDesktop on Acropolis Hypervisor
    Source: Citrix Systems
    White Paper: Citrix XenDesktop on Nutanix is a powerful solution which offers unrivaled user experience, simple administration and web-scale flexibility and economics. This reference architecture document provides recommendations for the design, optimization and scaling of XenDesktop deployments on Nutanix Acropolis Hypervisor.
  • Simplify VDI and Lower Risks with Citrix Validated Solutions for Nutanix
    Source: Citrix Systems
    White Paper: Learn how to use the Citrix Validated Solution for Nutanix Virtual Computing Platform to run Citrix XenDesktop and XenApp, which delivers an excellent end-user experience for a diverse mix of users spread across diffferent locations, for hundreds to tens of thousands of end users.
  • Accelerate Your VDI Journey from Pilot to Production with Nutanix and Citrix
    Source: Citrix Systems
    White Paper: Desktop and application virtualization have emerged as powerful tools to address a variety of IT challenges. Whether you are deploying hosted shared or virtual desktops or virtualizing end-user applications, Citrix® and Nutanix can help you succeed, allowing you to start small and scale smart while doing more with less.
  • 2016 Malware Year in Review: Tricks, Threats, and Triumph
    Source: PhishMe, Inc.
    Webcast: Listen to PhishMe Threat Intelligence Expert, Brendan Griffin, to learn about the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware. Now more than ever, it has become more important to detect and interdict malware during the delivery phase. What can you do to defend your environment? What will threat actors do to step things up in 2017?

    Join Brendan Griffin, to learn about:
    - The evolution of malware and encrypted ransomware and 2016's most prevalent threats
    - Identifying the latest malware delivery tools and techniques
    - Developing a modern defense strategy and empowering your users
    - What to look out for in 2017
  • 2016 Year in Review Malware Infographic
    Source: PhishMe, Inc.
    Research/Infographic: An at-a-glance 2016 Year in Review Malware Infographic, with a close look at the fastest-growing attack vector of the past year: Ransomware. PhishMe's research team found that the explosive growth of ransomware was the most significant trend of 2016. The extraordinary increase in the number of ransomware attacks made destructive malware a fixture on the threat landscape. The infrastructure supporting ransomware has become sophisticated and immense. PhishMe's 2016 Malware Year in Review Report shows that threat actors distributed huge numbers of diverse ransomware payloads for the greatest return on their investments. Threat actors never forgot about the value of information. Malware designed to steal information - financial or otherwise - was still very prevalent and the numbers of distinct attacks using this category of malware tool keeps its position as a favorite for threat actors.
  • Data Breaches and The Great Security Disconnect
    Source: PhishMe, Inc.
    Research/Infographic: The growing sophistication and fast-evolving nature of cyberthreats have made data breach preparedness a critical issue for enterprises. View our interactive infographic to learn the surprising statistics and how you can adjust. Three cyberthreats have quickly emerged as major new data breach threats that leave organizations vulnerable and exposed to substantial damage: Phishing, Malware and Ransomware.
  • Technology Can Stop Phishing Breaches? Oh, Really??
    Source: PhishMe, Inc.
    Webcast: Ransomware was the #1 cybersecurity threat in 2016. Phishing continues to thrive as the #1 attack vector used by hackers today. And technology continues to fail to stop it. In 2016, spear-phishing attacks rose 55%, Ransomware attacks grew 4X and Business Email Compromise (BEC) losses skyrocketed 1300%.
    Join PhishMe as we look back on the top attacks and explore how to use a combination of Human and Technology to stop phishing attempts before they progress to a breach. In this presentation, we will cover:
    - The big phishes of 2016 and what to look out for in 2017
    - Why good employees click on bad emails - the emotional and situational triggers
    - How engagement can decrease susceptibility
    - How IR teams can stay on top of attacks in progress

Results 1 - 15 of 813