Skip Links

Network World

Resource Library

  • How to Transform Employee Worst Practices Into Enterprise Best Practices
    Source: KnowBe4
    White Paper: Despite all the funds you may have spent on state-of-the-art security software, the bad guys are just one gullible user click away from staging an all-out invasion. Such incidents are skyrocketing. According to a recent study by Osterman Research, email is the most prevalent channel of infiltration into the enterprise. This whitepaper provides clear direction on how to go about improving your organization's security posture by "inoculating" employees who fall for social engineering attacks.
  • Best Practices for Dealing with Phishing and Next-Gen Malware
    Source: KnowBe4
    White Paper: Phishing and malware threats are skyrocketing. To combat these attacks, read this new Osterman Research white paper that gives you a list of high-priority actionable items, all related to IT security.
  • The Phishing Breakthrough Point
    Source: KnowBe4
    White Paper: Utilizing security awareness training and phishing security tests can be effective tools to reduce unintentional insider threats. However, if robust metrics are not put in place, phishing tests can create organizational social engineering blind spots. Find out more about the breakthrough point in an organization's phishing awareness level.
  • Ten Rules for Bring Your Own Device
    Source: IBM Corporation
    White Paper: The rapid proliferation of mobile devices entering the workplace appears to be like divine intervention to many IT leaders. Mobile devices and their apps have transformed the way we live - how we communicate, travel, shop, work and so much more. This mobility transformation has been so radical, so revolutionary, that it is hard to imagine life without these devices. Bring Your Own Device (BYOD) was born and employees followed with fervor.
  • Top Ten Reasons You Don't Need Mobile Device Management (MDM)
    Source: IBM Corporation
    White Paper: Smartphones are a fad. Tablets? Simply an unruly smartphone that's too smart for its own good. Who needs them? Haven't we done just fine all of these years without them and without all of this crazy untethered connectivity? And the idea of using smartphones and tablets for work, so users can be more mobile and flexible? Is that really such a good thing, all these people out there doing work wherever they go, virtually any time of day?
  • The ABCs of Mobile Device Management
    Source: IBM Corporation
    White Paper: Bring Your Own Device is simple in concept, but for IT the concept is suspect. The mobile workforce expects to use personal smartphones and tablets for work and play - and with Mobile Device Management, concerns about security generally fade away.
  • Threat Intelligence: Understanding What It Is and Why You Need It
    Source: InfoArmor, Inc
    White Paper: When it comes to the world of cybersecurity, threat intelligence is a great tool to support an enterprises ability to take defensive actions and provide protection from potential threats. However, not all threat intelligence is created equal. Read this white paper to:
    * Gain a better understanding of why you need threat intelligence
    * How to deliver on the promise of threat intelligence
    * Learn seven key determiners your company should look for from potential solutions.
  • Securing Mobile Productivity for Microsoft Office 365
    Source: IBM Corporation
    White Paper: IBM MaaS360 enables you to deploy Microsoft tools with robust security across all mobile platforms.

    From smartphones and tablets to laptops and wearable devices, today's enterprises are awash in mobile technology. Some of the technology is employee-owned-and may even be part of an official "bring-your-own-device" (BYOD) initiative-while the rest is company-issued equipment, but the distinction doesn't really matter when it comes to security. IT organizations must manage and secure all of the devices that access corporate data, applications (or "apps") and content.
  • Best Practices for Dealing with Phishing and Next-Gen Malware
    Source: KnowBe4
    White Paper: Phishing and malware threats are skyrocketing. To combat these attacks, read this new Osterman Research white paper that gives you a list of high-priority actionable items, all related to IT security.
  • Your Money or Your Files! A Short History of Ransomware
    Source: KnowBe4
    White Paper: One of the key methods cybercriminals are using is ransomware, most famously the Cryptolocker malware, and its numerous variants, which encrypts the less on a user's computer and demands the user pay a ransom, usually in Bitcoins, in order to receive the key to decrypt the less.
  • The Phishing Breakthrough Point
    Source: KnowBe4
    White Paper: Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place, phishing tests can create organizational social engineering blind spots.

    This whitepaper answers questions to:
    - What is the breakthrough point in an organization's phishing awareness level?
    - What metrics need to be put in place to prevent social engineering blind spots?
    - How effective can phishing awareness training be in protecting your network?

    Download the whitepaper now
  • How to Transform Employee Worst Practices Into Best Practices
    Source: KnowBe4
    White Paper: Despite all the funds you may have spent on state-of-the-art security software, the bad guys are just one gullible user click away from staging an all-out invasion. Such incidents are skyrocketing. According to a recent study by Osterman Research, email is the most prevalent channel of infiltration into the enterprise. This whitepaper provides clear direction on how to go about improving your organization's security posture by "inoculating" employees who fall for social engineering attacks.
  • Ransomware Hostage Rescue Manual
    Source: KnowBe4
    White Paper: Get the most informative and complete Ransomware Hostage Rescue Manual. This manual is packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware. You will also receive a Ransomware Attack Response Checklist and Ransomware Prevention Checklist.
  • Security Awareness Training: Are We Getting Better at Organizational and Internet Security?
    Source: KnowBe4
    White Paper: For the second year in a row, leading IT analyst firm Enterprise Management Associates (EMA), has delved into the world of security awareness and policy training. Their latest research on this topic revealed that a tremendous shift in awareness training programs has taken place, especially in small and medium businesses.

    However, attackers are constantly honing their skills and adapting their attack methods, and your employees remain the weak link in your network security.
  • Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
    Source: IBM Corporation
    White Paper: Essential capabilities for secure mobility.


    Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features. In this white paper we will look at NIST and DISA efforts to articulate requirements for Mobile Device Management.

Results 1 - 15 of 542