ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Defending the Indefensible: Preparing for an Uncertain Digital Future

    Sponsored by: LogRhythm, Inc.

    The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.

  • Stay One Step Ahead of Cyber Attacks

    Sponsored by: Verizon

    Discover a "Data Breach Investigations Report" that provides organizations with information needed to prevent attacks, quickly detect breaches, and reduce damage. Access now and get the cybersecurity intelligence necessary for successful protection.

  • The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems

    Sponsored by: Verizon

    Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.

  • Information Security Asean July 2016

    Sponsored by: SearchSecurity.com

    In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • HITRUST CSF Certification – Frequently Asked Questions

    Sponsored by: Coalfire

    What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.

  • Unlocking Ransomware, the Lucrative Criminal Business Model: An Analyst Report

    Sponsored by: Palo Alto Networks

    Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organizations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.

  • Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces

    Sponsored by: Dell, Inc.

    Explore some of today's challenges in endpoint security and how desktop virtualization strategies can significantly reduce risks and improve protection at endpoints. You'll also examine real-world examples of organizations using desktop virtualization architectures with thin clients to enhance security.

  • A Look Behind the Firewall

    Sponsored by: Fortinet, Inc.

    Discover in this infographic how to diagnose your network performance based on traffic devoted to social media, audio, and video—and determine how this media may compromise your security. Read on to discover how to run a cyber-threat assessment to ensure your core business assets are well protected.

  • Defend Against the Undetected

    Sponsored by: Fortinet, Inc.

    This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.

  • Cyberhunting: A Critical Component of Enterprise Security

    Sponsored by: Infocyte

    Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.

  • 2016 Security Buyer's Guide

    Sponsored by: Illumio

    Access a step-by-step guide, complete with checklists, for adaptive security buyers in 2016. This guide will allow enterprises to pre assess their security posture, discover gaps, and evolve their strategy to better suit the hybrid-cloud environment.

  • Best Practices for Strong Cyber Security

    Sponsored by: Hewlett Packard Enterprise

    Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.

  • Behind the Mask: The Changing Face of Hacking

    Sponsored by: Hewlett Packard Enterprise

    This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.

  • Cyber Risk Report 2016 Executive Summary

    Sponsored by: Hewlett Packard Enterprise

    In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.

  • The Global Cost of Cyber Crime

    Sponsored by: Hewlett Packard Enterprise

    Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.

  • Data protection and security incident response when all information is a target

    Sponsored by: Intel

    In the face of sophisticated cyberattacks, companies have been forced to escalate cybersecurity risk management tactics and strategies beyond traditional (i.e. outdated) methods. This vendor-neutral guide provides the benefits and steps to developing better methods for identifying imminent cyberattacks and preventing breaches before it's too late.

  • Facing Network Breach Threats, Visibility Is Key

    Sponsored by: Intel

    If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.

  • Cloud Security Requires Shared Responsibility Model

    Sponsored by: CloudPassage

    When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.

  • Why Visibility Is More Important Than Stopping an Attack

    Sponsored by: Intel

    Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats? Find out in this expert resource from searchSecurity.com.

  • Threat Defense Isn't Just About Detection: It's How Your Respond

    Sponsored by: Intel Security

    EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.

  • Case Study: Global Security Management Made Easier for Leading IT Service Provider

    Sponsored by: Intel Security

    Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.

  • The Impacts of Organizations Not Keeping Up with Cybercriminals

    Sponsored by: Proofpoint, Inc.

    Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.