RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
EGUIDE:
In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
EGUIDE:
Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
EGUIDE:
Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
EGUIDE:
They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.
RESOURCE CENTER:
Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
EGUIDE:
Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
EGUIDE:
This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
EGUIDE:
Find out why a security operations center (SOC) can be a valuable part of your organization's cybersecurity strategy. Learn how to set one up, from the 3 types of SOC employees needed to core principles that organizations should follow when setting up their SOC.