ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:SearchSecurity.com

  • The Digital Certificate: How It Works, Which to Buy

    If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.

  • Information Security magazine Insider Edition, January 2017

    Security for IoT requires a policy that includes a comprehensive list of devices that need attention and a system for regular IoT security testing.

  • Unleash Your Security Data's Full Potential

    Battling today's top cybersecurity threats requires the best in threat intelligence and security tools; learn what your enterprise defense posture needs now.

  • Judging MSSP Options With Care

    The managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider.

  • Dedicated to Information Security: The High-Stakes Role of the CISO

    Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.

  • What to Look for in Incident Response Management Tools

    Breaches are inevitable, so an effective incident response toolkit is essential. In this buyer's guide, learn the current and upcoming requirements for IR tools and what features are most vital.

  • Why DevOps + Security = A Bright Idea

    By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures.

  • Security Analytics: Searching for Meaning

    This expert e-guide helps clarify how advanced security analysis differs from the threat assessments of the past. Access now for a deeper understanding of how advanced security analytics works and how it can best be used in your organization.

  • Minimizing Cyber Risk with Better Threat Detection and Incident Response

    The security incident response process must cope with an increasingly constant onslaught of attacks. Learn how to automate and better collaborate your company incident response.

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

  • CW ANZ November 2016

    With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.

  • Straddling the Security Divide Between On-Premises and Cloud

    Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.

  • Are You Ready for RASP?

    This runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.

  • Put Endpoint Security in Capable Hands

    Endpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure.

  • From IoT to IDoT: Securing the Identity of Things

    With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks. In this issue of Information Security, we discuss the Identity of Things problem, and how you can solve it.

  • Next-Gen Autentication

    This Security classroom explores the latest in authentication methods and technologies.

  • 5 Steps to Raising Ransomware Resistance

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Cloud Services Take Off, GRC Doesn't

    The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.

  • Say Hello, Again, to SIEM

    SIEM products are ever-changing technologies. Here's what you need to know now about security information and event management tools.

  • Securing DevOps

    In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.

  • What to Look for in Web Fraud Detection Systems

    In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.

  • A Certified Concern

    Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.

  • Time for an IAM Overhaul

    IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.

  • Buff Up Your Web Apps

    Secure web apps are essential to modern business. Learn what security risks they present and get our experts' advice on how to overcome them.

  • Time to Toughen Up for IoT

    This 3-part guide is filled with best practices for Internet-enabled device security, looking at such things as raising awareness of potential security threats wrought by IoT and how to test your defenses in the IoT era.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.