ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Micro-segmentation: Security for Every Data Center

    Sponsored by: VMware

    Firewalls are a security strategy that companies are discovering is wholly inadequate against today's sophisticated cyberattacks. To defend against cyberattacks, today's enterprises need a sophisticated approach to data center security. In this white paper, learn about a new approach to data center security designed for current threats.

  • Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense

    Sponsored by: Proofpoint, Inc.

    Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

  • How Enterprise Security Leaders are Now Forced to Address Top Security Threats

    Sponsored by: Fortinet, Inc.

    Today's IT threat landscape is expanding, and new areas are at risk that businesses have never had to worry about before. This white paper identifies 5 cyberthreat areas that are putting organizations at risk today, as well as some steps you can take to minimize the danger they pose.

  • Cyber-physical attacks: Dawn of a new age in cyber-warfare?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series explores the application of cyber power in international relations

  • CW ASEAN March 2017: Raising national security standards

    Sponsored by: TechTarget ANZ

    In this month's CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems.

  • CW ANZ March 2017: Take cover from cyber threats

    Sponsored by: TechTarget ANZ

    In the latest issue of CW ANZ we focus on security, with analysis of why Australian organisations are not sold on cyber insurance.

  • The Different Types of Cyber-Attacks and How to Prevent Them

    Sponsored by: SonicWall

    This e-book explores four primary strategies cybercriminals use to infiltrate your network, and best practices for countering them. Learn how you can successfully combat common cyber-attacks ransomware, encrypted attacks and more.

  • The Importance of Threat Intelligence Services

    Sponsored by: Dell SecureWorks

    Threat actors are upping the ante in their methods to penetrate your environment. Don't leave your IT environment prone to attack. Learn about detection tech and methods that can provide your organization with elite cyber threat intelligence, malware analysis and rapid incident response.

  • The State of the Cybersecurity Arms Race

    Sponsored by: SonicWall

    In the war against cybercrime, no one gets to avoid battle. In this resource, industry expert Bill Conner provides insight into staying up-to-date on the latest threats and cybersecurity innovations shaping today's landscape.

  • Fighting the Latest Evolution of Money Laundering

    Sponsored by: BAE Systems

    This report explores how to meet the ever-growing threat of financial cybercrime. Discover how to take an integrated approach to detecting and preventing cybercrime that leverages anti-money laundering (AML) technologies, blockchains, machine learning, and more.

  • 6 Steps to Proactive Cybersecurity Protection

    Sponsored by: BAE Systems

    Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.

  • CW Europe – March 2017

    Sponsored by: ComputerWeekly.com

    Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.

  • Advanced Detection of Existing, New and Evolving Cybersecurity Threats

    Sponsored by: BAE Systems

    According to security experts, SIEM is currently catching less than 1% of successful advanced threats. Learn how to go beyond SIEM and discover how to incorporate a data platform with advanced threat analytics, big data capabilities, and an investigation console into your cybersecurity strategy.

  • Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.

  • Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses

    Sponsored by: BAE Systems

    Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.

  • ASEAN CIO Trends 2017 #1

    Sponsored by: ComputerWeekly.com

    There are two things that keep CIOs awake at night – data breaches that affect the reputation of their firms, and the need to better understand customer needs. Against this backdrop, CIOs can no longer be content with keeping the lights on. In this e-guide, find out what it takes for CIOs to succeed in 2017.

  • ANZ CIO Trends 2017 #1

    Sponsored by: ComputerWeekly.com

    There are two things that keep CIOs awake at night – data breaches that affect the reputation of their firms, and the need to better understand customer needs. Against this backdrop, CIOs can no longer be content with keeping the lights on. Read how CIOs in Australia/New Zealand are demonstrating the value of IT within their organisation.

  • Exploring the Threat Intelligence Process

    Sponsored by: Recorded Future

    This video demonstrates how you can use real-time threat intelligence to sort through data quickly so that you can focus on what matters: threat analysis and detection. Uncover the 3 core steps that go into the threat intelligence process.

  • Turning Threat Data Into Threat Intelligence

    Sponsored by: Recorded Future

    Explore how you can consolidate massive amounts of real-time data from a wide range of sources in a concise view of available threat intelligence. See how you can view threat-related entities at once, such as hashes, domains, threat actors, and more.

  • Inside Look at Cyberattack Trends and Statistics

    Sponsored by: Recorded Future

    Discover eye-opening cyberattack trends and statistics in this white paper. Learn more about the methods of cybercriminals happing in the dark web and how you can reduce risk of an attack using threat intelligence strategies.

  • The Current State of Blockchain Compliance

    Sponsored by: BAE Systems Applied Intelligence

    In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.

  • Artificial Intelligence and Machine Learning: Cybersecurity Advances

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.

  • The Ultimate Guide to Cybersecurity to Drive Profitability

    Sponsored by: Cisco Systems, Inc.

    This e-book explores how to turn cybersecurity success into a true competitive advantage that enables faster innovation. Discover how to secure your network to prevent costly downtime, equipment damage, compliance issues and more. Plus, learn how to leverage threat intelligence to bolster malware defense and improve network visibility.

  • In 2017, the insider threat epidemic begins

    Sponsored by: ComputerWeekly.com

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.