Whitepapers for Information Security

The Importance of Gamification in Cybersecurity
The Importance of Gamification in Cybersecurity By : Circadence

Cybersecurity awareness trainings are usually a boring affair, by training with gamification, you ca...Read More

tags Security Threats | Securities | Information Security | Malware | Cyber Threats

Five Best Practices For Information Security Governance
Five Best Practices For Information Security Governance By : Diligent

Successful Information Security Governance doesn’t come overnight; it’s a continuous process of ...Read More

tags Securities | Information Security

Unlocking the Value of SAP Change Intelligence: What Developers and Security Managers Ask About Implementing Salt in Their SAP Systems
Unlocking the Value of SAP Change Intelligence: What Developers and Security Managers Ask About Implementing Salt in Their SAP Systems By : Revelation Software Concepts

Salt reduces risk in SAP systems by providing current, accurate SAP change intelligence on systems a...Read More

tags Operating Efficiencies | Information Security | Automation | SAP | Enterprise

Classification of Information: Accuracy of Classification Models
Classification of Information: Accuracy of Classification Models By : ABBYY

Classification of information to organize large data sets is a critical tool in the drive to busines...Read More

tags Information Technology | Information Security | Knowledge | Knowledge Management

Information Sharing with SOPHIA “People, Process, and Technology”
Information Sharing with SOPHIA “People, Process, and Technology” By : Covenant Security Solutions, Inc

Learn how can SOPHIA help organizations to improve the overall protection for physical and Cyber sec...Read More

tags Security Threats | Information Technology | Information Security | Cyber Threats

Configuration Management for Electronic Security Systems
Configuration Management for Electronic Security Systems By : LABUSA

learn how configuration management can help you protect your IT environment from unauthorized commun...Read More

tags Security Threats | Data Security | Information Security | IT Infrastructure

The New Imperative: Securing Enterprise Content
The New Imperative: Securing Enterprise Content By : Accellion

Is protecting and managing sensitive content the top priority for your enterprise content management...Read More

tags Security Threats | Data Security | Information Security | ECM | Content Management

Best Practices for Managing ESI on Mobile Devices
Best Practices for Managing ESI on Mobile Devices By : NightOwl Discovery

Organizations face a number of challenges in reviewing the mobile ESI companies should have a plan i...Read More

tags Security Threats | Securities | Data Security | Information Security | Application | Mobile

6 Things That Will Accelerate Enterprise Mobility Security Adoption
6 Things That Will Accelerate Enterprise Mobility Security Adoption By : SyncDog

By 2020, there will be more than a billion M2M connections, each device module capable of accessin...Read More

tags Security Threats | Risk Management | Information Security | Mobile | Cyber Threats


Next