ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Redefining Next-generation Endpoint Security Solutions

    Sponsored by: Intel Security

    Discover how to streamline security operations using next-generation endpoint security. Learn about these new tools built for centralization, consolidation and integration that'll help you prevent advanced malware from infecting your endpoints and crippling your organization.

  • Not Today Zero-Day

    Sponsored by: Intel Security

    Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.

  • RANSOMWARE Hostage Rescue Manual

    Sponsored by: KnowBe4

    This informative white paper teaches you the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.

  • Defense-In-Depth with Internal Segmentation Firewalls

    Sponsored by: Fortinet, Inc.

    Deployed at strategic points, internal segmentation firewalls (ISFWs) increase threat visibility and enhance breach discovery. Learn how to stop the uncontrollable spread of cyberthreats within your borderless network and prevent any single point from introducing vulnerability.

  • IT Decision Maker's Cybersecurity Survey 2016

    Sponsored by: Fortinet, Inc.

    This 2016 survey of 1,399 IT decision makers (ITDMs) highlights the shared concerns of new vulnerabilities and security challenges spread across EMEA, APAC and Latin America. Learn how present security infrastructures have struggled to contend with the realities of an increasingly hostile digital world.

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • Are You Leaving the Door Open for Cyber Threats?

    Sponsored by: Palo Alto Networks

    In this exclusive e-guide, learn how businesses can eliminate security boundaries and develop a resilient defense posture against readily-advancing threats. Read on to uncover how to choose the right firewall, enable steadfast security within virtually all type of apps, and more.

  • Dedicated to Information Security: The High-Stakes Role of the CISO

    Sponsored by: SearchSecurity.com

    Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's elevation and influence on broader security initiatives, plus challenges of the job and the changes ahead.

  • The Threat Lifecycle Management Framework

    Sponsored by: LogRhythm, Inc.

    You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM). Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR).

  • The Future of Security: Advanced Security Analytics

    Sponsored by: LogRhythm, Inc.

    As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.

  • Top 3 Cybersecurity Challenges Facing Healthcare Organizations

    Sponsored by: Arctic Wolf Networks, Inc.

    Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.

  • The Top Cybersecurity Risks – And How Enterprises Are Responding

    Sponsored by: Arctic Wolf Networks, Inc.

    Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.

  • Ransomware: 3 Seconds to Encryption

    Sponsored by: Arctic Wolf Networks, Inc.

    Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.

  • IoT Guardian for the Healthcare Industry

    Sponsored by: Zingbox

    Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.

  • Four Countermeasures to Protect Against Ransomware

    Sponsored by: Trend Micro

    Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.

  • Guide to Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    This short guide will help you understand how encrypted traffic is growing and how it's increasingly being exploited. Get tips on how to protect your SSL/TLS traffic, and learn how to effectively monitor your network traffic for potential intrusions.

  • Dangerous Threats Require Backup for Data Protection and Recovery

    Sponsored by: Code42

    Discover the intricacies of data leakage and theft, the motivations and tactics of a wide range of attackers, and guidance for effective action against their machinations.

  • Making DDoS Mitigation Part of Your Incident Response Plan - Critical Steps and Best Practices

    Sponsored by: Akamai

    The time to prepare yourself for a DDoS attack was yesterday. Discover why distributed denial of service (DDoS) attacks are so damaging to organizations and understand what you can do to protect your company today.

  • Barbarians at the Gate - Shoring Up Web Application Defenses with Client Reputation

    Sponsored by: Akamai

    Web application firewalls (WAFs) have become increasingly useful in mitigating cyberthreat risk to online assets for many companies. Learn how this and other cloud security approaches should be used in combination as part of your comprehensive defense strategy.

  • Threats and Mitigations: A Guide to Multi-Layered Web Security

    Sponsored by: Akamai

    Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.

  • RoundTower Technologies Protects its Customer's SDN: Video Case Study

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.

  • Top 10 Security Advantages of One Business Management Platform

    Sponsored by: Acumatica

    Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.

  • Definitive Guide to Security Intelligence and Analytics

    Sponsored by: LogRhythm, Inc.

    Security intelligence and analytics are key to uncovering and recovering from major cyberattacks. Learn how to be smart about detection and prevention, from surveying the cyberattack lifecycle to selecting the right security tool.

  • IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy

    Sponsored by: SAS

    Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.

  • User and Entity Behavior Analytics (UEBA): Data Sheet and Use Cases

    Sponsored by: LogRhythm, Inc.

    Detect and neutralize known and unknown user-based threats with the help of user and entity behavior analytics (UEBA). With it, learn how to analyze diverse data sets to expose insider threats, compromised accounts, and privilege misuse and abuse—all in real time.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.