Getting (and Staying) Ahead of Advanced Threats
"Getting (and Staying) Ahead of Advanced Threats" is a workbook to create a personalized scorecard that assesses the effectiveness of your current security strategy and shows you why a trust-based security solution is your best defense against advanced malware.
The Content Security Forecast Calls For Clouds
The security benefits of the SaaS model outweigh its challenges, according to Forrester Research.
Measuring Software Quality: A Study of Open Source Software
As part of a Department of Homeland Security (DHS) federally-funded analysis, a new baseline for security and quality in open source software has been established
Closing the data privacy gap: Protecting sensitive data in non-production environments
How can IT organizations protect sensitive data, including employee and customer information, as well as corporate confidential data and intellectual property? Industry analysts recommend "de-identifying" or masking data as a best practice for protecting privacy.
This white paper explains the importance of closing the data privacy gap in non-production environments, and provides guidance on effective data masking.
Complimentary with registration. Sponsored by IBM.
E-Discovery and Electronic Document Retention in Canada
This paper is a guide to understanding the role of the IT department in the management of electronic documents and support of e-discovery, given new legislature described as "SOX for the CIO".
Even without these changes, the issues related to how day-to-day document retention
policies and practices affect the outcome of litigation, has become patently obvious at the
board level. This will undoubtedly bring new interest to existing guidelines on e-discovery in Ontario and in Canada, as many Canadian companies must now consider these amendments as
they do business in Canada, or are subject by contractual terms to US laws.