Skip to main content

Behind the Curve? A Maturity Model for Endpoint Security

Behind the Curve? A Maturity Model for Endpoint Security

36342 (PDF, 4.27MB)

22 Oct 2015
ByG. Mark Hardy
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

A Startups Guide to Implementing a Security Program

Research Paper

Startups struggle to balance survival with the practical implementation of a security program. There...

  • 8 Oct 2020

Putting it all together through Automation

Research Paper

Most problems faced in Information Security are typically time sensitive. For Forensic Engineers and...

  • 22 Apr 2019

Information Security Best Practices While Managing Projects

Research Paper

To maximize long-term return on investment (ROI) with a project's delivery, taking information...

  • 25 Mar 2019

Logon Banners

Research Paper

Logon banners have been a common feature of operating systems and applications for many years....

  • 20 Mar 2019

Security Considerations for Team Based Password Managers

Research Paper

Password management applications are a common and practical way to store complex passwords. They use...

  • 23 Jul 2018

Content Security Policy in Practice

Research Paper

The implementation of Content Security Policy to leverage web browser capability in protecting a web...

  • 6 Jul 2018

Agile Security Patching

Research Paper

Security Patch Management is one of the biggest security and compliance challenges for organizations...

  • 3 May 2018

Speed and Scalability Matter: Review of LogRhythm 7 SIEM and Analytics Platform

Research Paper

Just how scalable, fast and accurate are SIEM tools when under load? To find out, we put the...

  • 13 Apr 2017
  • Dave Shackleford

Bill Gates and Trustworthy Computing: A Case Study in Transformational Leadership

Research Paper

The notion that IT security is a serious issue is non-controversial. The market for cybersecurity...

  • 20 Sep 2016

Filling the Gaps

Research Paper

There should be an emphasis on the importance of regular internal and external auditing focusing on...

  • 18 Aug 2016

Investing in Information Security: A Case Study in Community Banking

Research Paper

Small businesses, such as community banks, often do not have resources dedicated to information...

  • 12 Aug 2016

Introduction to Rundeck for Secure Script Executions

Research Paper

Many organizations today support physical, virtual, and cloud-based systems across a wide range of...

  • 11 Aug 2016

Using Information Security as an Auditing Tool

Research Paper

As cyber-attacks are gaining visibility within mainstream media, what once was knowledge for...

  • 14 Jul 2016

Applying Data Analytics on Vulnerability Data

Research Paper

Organizations, by law, should exercise due care and due diligence in securing data at rest, in...

  • 23 Dec 2015

Framework for Innovative Security Decisions

Research Paper

Remember the Periodic Table of chemical elements (Dayah, Dynamic Periodic Table, 1997)? It...

  • 3 Nov 2015

Security Data Visualization

Research Paper

The objective of this paper is to provide guidelines on information security data visualization and...

  • 28 Oct 2015

The Sliding Scale of Cyber Security

Research Paper

The Sliding Scale of Cyber Security is a model for providing a nuanced discussion to the categories...

  • 1 Sep 2015

Protecting Third Party Applications with RASP Infographic

Research Paper

Protecting Third Party Applications with RASP Infographic

  • 27 Aug 2015

What Companies need to consider for e-Discovery

Research Paper

Within the legal environment, Discovery is the process of identifying, locating, preserving,...

  • 24 Aug 2015

Integration of Network Conversation Metadata with Asset and Configuration Management Databases

Research Paper

The use of encryption to protect the confidentiality of network communications is on the rise.

  • 26 May 2015

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.