Your Cloud Servers Are Under Attack: How Can You Tell?
Exploding threats and attacks against private, public and hybrid cloud workloads put enormous pressure on enterprises trying to maintain visibility into their compute infrastructure. Traditional security tools simply don’t work well in this dynam…
AWS Cloud Security Report for Risk & Security Professionals
Key Takeaways AWS Is Serious About Information Security There has been too much hype about cloud security being different and inherently insecure. Cloud security is no different from other solutions we deploy. Security pros should apply the same securi…
AWS Cloud Security Report for Risk & Security Professionals
Key Takeaways AWS Is Serious About Information Security There has been too much hype about cloud security being different and inherently insecure. Cloud security is no different from other solutions we deploy. Security pros should apply the same securi…
Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment
The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud envir…
Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment
The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud envir…
Contemporary Cryptography
Cryptography is an enabling technology (or tool) to secure the information infrastructures we build, use, and count on in daily life. Computer scientists, electrical engineers, and applied mathematicians should care about (and be educated in) the princ…
Implementing SSL/TLS Using Cryptography and PKI (FREE for a limited time!) Valued at $39.99
If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you h…
STRATEGIES FOR GUARDING AGAINST HEALTHCARE CYBER THREATS
Emerging cyber threatsFrom 2012-2013, HIPAA data breaches rose 138 percent, with medical-related identity theft accounting for 43 percent of all identity thefts reported in the U.S. in 2013.Medical-device manufacturers are being singled out as the prim…


