The HTMLGoodies Research Center is a comprehensive library of free white papers, webcasts and other informative resources from today's leading technology vendors.
Browse by Topics
Browse by Sponsor
Sorry, no Oracle Security resources are currently available, but you may find these resources useful.
Threats to file security – both external and internal – are a growing issue. With cyber attacks ravaging the networks of governments and corporations, enterprise IT and security professionals need to adjust their data protection strategies. But in so doing, they must not neglect the threat represented by internal actors, either. This white paper takes a deeper look at the top five file security threats facing modern businesses, how a secure collaboration solution can help you guard against them, …
In the interest of faster workflows and better collaboration, employees are now sharing files containing sensitive or proprietary data more than ever before, both internally and externally. When these files move beyond the enterprise's security perimeter, they become vulnerable to a range of threats. Ultimately, mistakes will be made, either by your employees, or by a business partner or vendor. Read this eBook to learn how an enterprise file synchronization and sharing (EFSS) solution can provide file-level …
Financial services organizations, including banks, brokers, insurance, and wealth management advisors, are subject to a number of regulations to govern data security, making these institutions subject to a great deal of scrutiny over their cybersecurity efforts. This regulatory scrutiny makes data breaches particularly costly. Data breaches can come from any number of sources, including mistakes from well-intended employees, rogue employees, and international crime organizations. Read this executive brief to …
The Internet of Things (IoT), a growing network of physical devices with Internet connectivity, can collect and exchange rich data. Organizations utilizing the Enterprise of Things (EoT) are also at a greater risk for data breaches and cybersecurity threats. Healthcare organizations striving to realize the full potential of the EoT must also be able to confidentially and reliably transmit highly sensitive data between connected devices. Read this white paper to discover the best cybersecurity strategies to get …