Whitepapers

Higher Education: Open and Secure? A SANS Analyst Survey – June 2014

To better understand the current state of information security in higher education, SANS Institute conducted a market survey between February and March 2014. Generating nearly 300 responses, the survey findings were analyzed and compiled into the report, “Higher Education: Open and Secure?” by SANS analyst, and Virginia Tech, CISO, Randy Marchany.

Addressing the Top 5 Security Challenges of Higher Education

Tenable works with a number of customers in the higher-education sector. These institutions share a number of common challenges. Of these, five rise to the top and provide the basis for this industry brief, developed for Tenable by Tech Target. Titled, “Addressing the Top 5 Security Challenges of Higher Education,” the paper highlights and offers solutions for the following challenges:

Dangerous Liaisons: BYOD, Virtualization, the Cloud, and “the Untouchables

Changes in technology come fast and furious—so it’s not surprising to learn that traditional network scanning solutions miss up to 40% of connections. Any one of them could be a threat. Increased use of mobile devices, the cloud, virtual systems, and the inevitable “untouchable” IT resources all expose you to new malware risks every day. Your job as guardian of network security is just getting harder.

VMware Product Applicability Guide for PCI DSS

All organizations that transmit, process, or store payment card data must comply with PCI DSS 3.0 requirements by Jan 1, 2015.

However, PCI guidance is written to be vendor agnostic, and as a result, can be challenging to map to vendor solutions. Furthermore, virtualization software introduces complexity to validating against the compliance requirements.

Vulnerability Management and Risk Assessment for the Cybersecurity Framework

Tenable Network Security, Inc. serves customers worldwide and each of our customers has a unique set of vulnerability management and compliance requirements. This paper provides insight to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, which calls for “a set of industry standards and best practices to help organizations manage cybersecurity risks”.

Close The Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring

Despite having vulnerability management solutions deployed, organizations continue to be compromised. Tenable Network Security commissioned Forrester Consulting to assess the current state and effectiveness of vulnerability management. The research included an in-depth survey of 180 US-based security leaders from multiple verticals including financial services, government, healthcare, higher education, retail, and utilities/energy.

2014 Cyberthreat Defense Report

In war, knowing your enemy is imperative to establishing an effective defensive strategy. The same holds true for effective IT security, and several excellent industry reports help inform IT security professionals on this front. The annual Data Breach Investigations Report from Verizon, for example, sheds considerable light on the evolving nature of cyberthreats, the actors behind them, and the techniques being used to perpetrate successful attacks.

Leveraging Continuous Monitoring to Mitigate Threats and Simplify Compliance

Definitive Guide™ to Next Generation Vulnerability Management

Legacy scanning is insufficient in detecting exposure from advanced threats, proactively spotting compliance issues before an audit, and assessing risk from mobile, virtual, and cloud technologies.

View this webcast to find out how Next-Generation Vulnerability Management provides Real-time Continuous Monitoring to overcome limitations with legacy solutions and combat today’s biggest security and compliance challenges.

Pages