ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Computer Weekly:Global Ransomware Attack Could Be a Security Wake-Up Call

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.

  • CW Nordics May 2017

    Sponsored by: ComputerWeekly.com

    The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The Internet of Things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.

  • Focus: how to avoid being hit by ransomware

    Sponsored by: ComputerWeekly.com

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • 4 Mobile Security Insights for CISOs

    Sponsored by: Lookout

    Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.

  • Countering Evolving Cybersecurity Challenges

    Sponsored by: Fortinet, Inc.

    Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms.

  • The IoT Explosion's Impact on Enterprise Security

    Sponsored by: Fortinet, Inc.

    Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany

  • Rethinking the Approach to Cybersecurity

    Sponsored by: Fortinet, Inc.

    Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware.

  • Threat Hunting For Dummies

    Sponsored by: Carbon Black

    It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.

  • Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF

    Sponsored by: F5 Networks

    More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.

  • Rethinking the Approach to Cybersecurity

    Sponsored by: Fortinet, Inc.

    Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware.

  • Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It

    Sponsored by: Proofpoint, Inc.

    This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.

  • 6 Ways to Use Threat Intelligence Data

    Sponsored by: Splunk

    Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more.

  • Mapping the Ransomware Landscape

    Sponsored by: Fortinet, Inc.

    This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack.

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

  • Cybersecurity Careers Soar

    Sponsored by: SearchSecurity.com

    In the security field, certifications and degrees are nevera substitute for on-the-job experience. In this month's Information Security magazine, we look at cybersecurity careers. Should your company invest in first-time CISOs, threat hunters and more diversity?

  • Build Strong Security, Starting From The Device-Level

    Sponsored by: Lenovo

    In this eGuide, take a look at physical security threats to which every computer—whether desktop PC, laptop or tablet— is vulnerable, and discover how to guard against them.

  • Beware the Beastly Threats of IT security

    Sponsored by: Lenovo

    It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.

  • Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity

    Sponsored by: ThreatConnect

    In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.

  • Cyber Threats: A perfect storm about to hit Europe?

    Sponsored by: ComputerWeekly.com

    As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.

  • NSS Labs Advanced Endpoint Protection Test Report

    Sponsored by: McAfee, Inc.

    NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this endpoint strategy and its security effectiveness.

  • 3 Common Password Policy Mistakes

    Sponsored by: Specops Software

    Most organizations don't have adequate password policy requirements. Take a look at the 3 common password policy mistakes that your organization might be making.

  • User and Entity Behavior Analytics for McAfee Enterprise Security Manager

    Sponsored by: McAfee, Inc.

    This document provides an overview of core UEBA capabilities available in McAfee Enterprise Security Manager and introduces the many partners whose products are tightly integrated and certified with this security platform.

  • Cyber security in the Middle East

    Sponsored by: ComputerWeekly.com

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Hunting ELFs: An investigation into Android malware detection

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series demonstrates how malicious Linux files, known as ELFs, can be detected on Android phones.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.