Data Security, Enterprise Security, Platform Security

Brivo Access Information Security White Paper

August 26, 2022

Brivo Access Information Security White Paper
As a provider of physical security services, we at Brivo believe that information security is of paramount importance to maintaining the safety and security of your facilities, and the privacy of your data. That’s why information security has been a consideration since day one.

Spotlight

TIBCO LogLogic

LogLogic is the provider of industry’s only scalable log and security intelligence platform for the enterprise and cloud. LogLogic, with over 1300 customers, provides solutions that allow customers to collect and analyze terabytes of big data generated by their IT assets and gives Security, IT Ops, and Compliance professionals actionable information at their finger tips to identify issues proactively and make insightful decisions, and also get compliant with various regulations. Currently, LogLogic customers are leveraging its solutions to manage over 1,000 Petabytes (or 1 Exabyte) of data.

OTHER WHITEPAPERS
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

HMC 1030 Connectivity Security White Paper

whitePaper | March 14, 2023

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

5 Top Residential Security Trends to Watch in 2023

whitePaper | February 24, 2023

The security industry has gained millions of households due to the explosion of DIY offerings and COVID-19. Households sought stability and safety during COVID and were able to find low-cost solutions. In 2022 though, home security system adoption slowed with home security ownership dropping from 2021 levels. The industry’s top players, however, are achieving record revenue in 2022 and that shows no signs of slowing. The rebound of professional installation since 2020 and recent solar system and service offerings have generated robust revenue growth.

Read More
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

Securing Water Utilities with AWS

whitePaper | March 3, 2023

Today, many U.S. water utilities want to implement cloud-based information technology (IT) and operational technology (OT) solutions to realize the operational and security benefits of the cloud. This whitepaper discusses the business drivers associated with cloud adoption in the U.S. Water Sector, cyber security trends, and outlines best practices for implementing cyber security controls at a water utility.

Read More

Spotlight

TIBCO LogLogic

LogLogic is the provider of industry’s only scalable log and security intelligence platform for the enterprise and cloud. LogLogic, with over 1300 customers, provides solutions that allow customers to collect and analyze terabytes of big data generated by their IT assets and gives Security, IT Ops, and Compliance professionals actionable information at their finger tips to identify issues proactively and make insightful decisions, and also get compliant with various regulations. Currently, LogLogic customers are leveraging its solutions to manage over 1,000 Petabytes (or 1 Exabyte) of data.

Events