White Papers: security


Sort by: Date | Company | Title


Using an Expert System for Deeper Vulnerability Scanning
By Rapid7 | 31/3/2014
This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
Download this now


Top 20 Critical Security Controls - Compliance Guide
By Rapid7 | 31/3/2014
Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
Download this now


VDI your users will love
By Citrix | 25/3/2014
Not all VDI solutions are alike. To deliver the best results for your business, you need to make sure the solution you choose can enable full productivity not just in the office on traditional endpoints, but anywhere people work, on any device they use. Read on to find out how you can provide access to virtualized apps and desktops from anywhere, on any device, with a great experience in any scenario.
Download this now


IDC MarketScape Excerpt: Worldwide Client Virtualization Software Assessment
By Citrix | 25/3/2014
The rise of BYOD is creating governance and regulatory nightmares while providing end users with unprecedented flexibility and agility. While IT is still intrigued by the possibility of a better desktop management model and the operational savings client virtualization software could deliver, it is the increased governance and the ability to deliver desktops, applications, and data to any device that are driving today's purchases.
Download this now


5 Best practices to make security everyone’s business
By Citrix | 25/3/2014
Employees are one of your greatest risks to information security. We share five proven techniques to strengthen your security strategy and protect your business.
Download this now


10 essential elements for a secure enterprise mobility strategy
By Citrix | 25/3/2014
Best practices for protecting sensitive business information while making people productive from anywhere.
Download this now


Secure application delivery for a mobile workforce
By Citrix | 25/3/2014
Mobility has given people new freedom to work anywhere, at any time - but it has also brought endless complications for IT. We show you how you can empower people to use Windows applications and native mobile apps on any type of device - with full security.
Download this now


Secure by design - How to dramatically simplify data protection, access control and other critical security tasks
By Citrix | 25/3/2014
This white paper examines how you can dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple, flexible remote access that enhances business productivity.
Download this now


Mobilizing Windows apps
By Citrix | 25/3/2014
Today’s workers expect greater levels of flexibility as they do their jobs, particularly the types of devices they work on and the locations they work from. IT must find ways to provide users with the required Windows business applications on mobile devices and in remote locations whilst preventing corporate data from leaving secure storage locations.
Download this now


Top 10 reasons to strengthen information security with desktop virtualization
By Citrix | 25/3/2014
This paper discusses: • The growing challenge of maintaining information security in today’s evolving enterprise environment • Key advantages of desktop virtualization as an inherently more secure computing architecture • The top ten benefits of using desktop virtualization to strengthen information security • And how you can regain control and reduce risk without sacrificing business productivity and growth
Download this now
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Protect against bugs in USB Storage devices

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.