ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Computer Weekly – 14 February 2017: Under surveillance – what the Investigatory Powers Act means for business

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the UK government has passed the Investigatory Powers Act, labelled a "snoopers' charter" that expands the scope of state surveillance – but what does it mean for businesses? We find out what digital transformation means in the fire and rescue service. And we examine the public cloud and storage. Read the issue now.

  • A Computer Weekly Buyer's Guide to Internet of Things Security

    Sponsored by: ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

  • Why SSL Decryption is Critical for Today's Secure Web Gateways & 5 Keys to an Effective Solution

    Sponsored by: ContentKeeper

    Discover why SSL decryption is a critical component for today's secure web gateways; and illustrated is a 5-point framework for evaluating these gateways to ensure you handle decryption successfully. Read on to also address the challenges associated with SSL decryption and how these created a big gap in effectiveness among solutions.

  • CW Benelux ezine February 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

  • Towards more robust internetworks

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.

  • Getting Out In Front of Cyberthreats In 2017

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.

  • Cybersecurity Essentials for 2017

    Sponsored by: Neustar

    In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine essential cybersecurity trends and highlight key tactics to better prepare you for what the coming year may bring.

  • Computer Weekly – 31 January 2017: Visionary technology transforming healthcare

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, find out how a visionary approach to technology is transforming healthcare at London's world-leading Moorfields Eye Hospital. The UK tech sector has set out its priorities for the forthcoming Brexit negotiations – we take a look. And our new buyer's guide examines trends in datacentre management. Read the issue now.

  • Pulse, January 2017, Volume 5, Number 1

    Sponsored by: SearchHealthIT.com

    Acess now to, gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot. Also in this issue of Pulse Magazine, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.

  • Cybersecurity as a Growth Advantage

    Sponsored by: Cisco

    Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives.

  • IT Security 101: Think Like A Cybercriminal

    Sponsored by: Solarwinds MSP

    In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the 6 key things to consider when assessing your IT security plan.

  • Trustwave Global Security Report

    Sponsored by: SingTel

    Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.

  • Best Practices for Enterprise Security

    Sponsored by: Citrix

    The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

  • The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

    Sponsored by: Absolute

    Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.

  • How to Identity Web Threats in Real-Time

    Sponsored by: Symantec & Blue Coat Systems

    Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.

  • Secure and Accelerate User Access to Web Applications

    Sponsored by: Symantec & Blue Coat Systems

    Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.

  • Deliver Complete Security for Enterprise Web Applications

    Sponsored by: Symantec & Blue Coat Systems

    Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.

  • Best Practices for Dealing with Phishing and Next-Generation Malware

    Sponsored by: KnowBe4

    This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.

  • Accelerating Your Incident Response & Improving Your Network Forensics

    Sponsored by: Symantec & Blue Coat Systems

    Network visibility is key to insightful security intelligence. Learn how to protect your workforce, fortify your network and improve overall security processes with complete visibility and streamlined forensics.

  • How to Transform Employee Worst Practices Into Enterprise Best Practices

    Sponsored by: KnowBe4

    Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.

  • CIO Trend #3 ANZ

    Sponsored by: ComputerWeekly.com

    Computer Weekly talks to more IT leaders than any other publication, giving us in-depth insights into the challenges facing CIOs, CTOs and CDOs. In this final installment of CIO Trends for 2016, we look at what's influencing IT decision-makers in Australia/New Zealand and explore the trends you can expect to see more of in the coming year.

  • Redefining Next-generation Endpoint Security Solutions

    Sponsored by: Intel Security

    Discover how to streamline security operations using next-generation endpoint security. Learn about new tools built for centralization, consolidation and integration that can help you prevent advanced malware from infecting your endpoints and crippling your organization.

  • Security Rating Scores for Third-Party Vendors Catching On

    Sponsored by: BitSight

    In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.

  • Businesses Eye VDI Security to Fight Cyberattacks

    Sponsored by: Citrix

    The rise of data breaches puts security as a top priority in businesses, and VDI is a layer that can help IT minimize the number of vulnerable endpoints. Download our e-guide to learn how VDI security can bulk up your defenses against cyberattacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.