ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Cloud Security Requires Shared Responsibility Model

    Sponsored by: CloudPassage

    When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.

  • What's Driving the State of Cybersecurity

    Sponsored by: Unisys

    The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.

  • Making the Case for SMB Security Services

    Sponsored by: CDW

    In this exclusive e-guide, Associate Editor Spencer Smith looks into the 3 main types of cyberthreats SMBs need to watch out for. Learn how SMBs can create a strong security strategy to prevent and mitigate attacks.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Anatomy of a Cyber-Attack

    Sponsored by: Dell Software

    You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.

  • Why Visibility Is More Important Than Stopping an Attack

    Sponsored by: Intel

    Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats? Find out in this expert resource from searchSecurity.com.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.

  • Securing Office 365 with Symantec

    Sponsored by: Symantec Corporation

    How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.

  • Cybersecurity in Healthcare: Why It’s Not Enough, Why It Can’t Wait

    Sponsored by: Symantec Corporation

    Find out the hazards of not keeping cybersecurity up-to-date within your healthcare organization and uncover ways you can safeguard yourself against attack in this essential infographic.

  • Threat Defense Isn't Just About Detection: It's How Your Respond

    Sponsored by: Intel Security

    Discover how to leverage endpoint detection and response (EDR) to create truly intelligent endpoints that automatically detect and respond to threats before they do their damage. Additionally, read on to see 5 criteria to look for when researching EDR solutions so you can determine which are most proactive in helping to prevent attacks.

  • Case Study: Global Security Management Made Easier for Leading IT Service Provider

    Sponsored by: Intel Security

    Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.

  • Operationalizing Threat Intelligence

    Sponsored by: Intel Security

    Learn how to leverage a collaborative platform for operationalizing threat intelligence—including real-time sharing of threat information across the IT infrastructure and delivery of adaptive protection. Discover how to interrupt the cyberattack chain and arming your enterprise with the latest cyberthreat intelligence insights.

  • Transcript: Eliminating Cyber Security Blind Spots with Application Awareness

    Sponsored by: Ipoque

    This webinar will review the hidden cyber security threats that Service Providers and Enterprises need to combat.

  • Podcast: ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS

    Sponsored by: Ipoque

    This webinar will review the hidden cyber security threats that Service Providers and Enterprises need to combat.

  • Think Like an Attacker: Six Steps Toward Better Security

    Sponsored by: Intel Security

    Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.

  • Security that Plays Well with Others

    Sponsored by: Intel Security

    As cyberattacks increase in volume and sophistication, organizations need to present a unified coordinated defense. Discover how an open, integrated security architecture can help you coordinate your siloed legacy security products and simplify the threat defense lifecycle.

  • Understanding Cyberthreat Motivations to Improve Defense

    Sponsored by: Intel Security

    Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.

  • ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS

    Sponsored by: Ipoque

    This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.

  • Beware the Invisible Cybercriminals: Cyberespionage and Your Business

    Sponsored by: Kaspersky Lab

    Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire, read our special report and find out more on cybercriminal techniques, common exploited vulnerabilities and more.

  • 2016 Cyberthreat Defense Report

    Sponsored by: Citrix

    This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • The Key to Protecting Your Business Amid Cybercrime’s Current Boom

    Sponsored by: CA Technologies

    This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.

  • Your Legal Liability Following a Cybersecurity Breach

    Sponsored by: SurfWatch Labs

    This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.

  • Cloud Security Gateways Rise to the Data Loss Challenge

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at cloud data loss prevention, the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection.

  • Building a Cloud Network: What Does It Mean?

    Sponsored by: MASERGY

    Building a network that supports cloud computing appears, for many engineers, to be a path paved by fat pipes. But that's not always the case. Find out what it means – and what it will take – to build a cloud network for your business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.