ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • The Executive’s Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read 3 additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.

  • Computer Weekly – 30 August 2016:Get protected

    Sponsored by: ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlight the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

  • Extracting actionable data from banking malware

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.

  • Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms

    Sponsored by: Schneider Electric

    This informational white paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. Access this information now to evaluate the merits of remote monitoring vendors and their solutions.

  • CW Benelux ezine August 2016

    Sponsored by: ComputerWeekly.com

    In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.

  • SunRice Reboots Their Cyberthreat Defense & ROBO Network Security

    Sponsored by: Palo Alto Networks

    In this case study, SunRice illustrates how to leverage a centralized security policy management platform to bolster cyber-threat defense and improve visibility of network infrastructure. Access now to streamline network security management and learn how to consolidate outdated legacy appliances.

  • Five Essential Elements for an Effective Mobile Security Strategy

    Sponsored by: vmware airwatch

    End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.

  • Cyber Security Trends ASEAN 2016

    Sponsored by: ComputerWeekly.com

    As cyber security becomes a top priority for policy makers and IT leaders, this guide looks at some of the issues facing government and private sector organizations in South-East Asia.

  • Cyber Security Trends ANZ 2016

    Sponsored by: ComputerWeekly.com

    As cyber security becomes a top priority for policy makers and IT leaders, this e-guide looks at some of the issues facing government and private sector organisations in Australia and New Zealand.

  • Industry Assessment: Key Findings on Effective Threat Protection

    Sponsored by: Check Point Software Technologies Ltd.

    This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.

  • Exposing the Unknown: How Sanboxing Technology Fights Modern Threats

    Sponsored by: Check Point Software Technologies Ltd.

    Access this white paper to examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. Read on to also explore the emerging role of sandboxing as a powerful weapon in cyber security.

  • Ransomware: What You Need to Know

    Sponsored by: Check Point Software Technologies Ltd.

    This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.

  • What If an Invisible Attacker Tried to Bring Down Your Business?

    Sponsored by: Lenovo

    In this podcast, Carl Woerndle of Distribute.IT talks about a series of cyberattacks that assailed his business. Listen to find out what key lessons he took away from the experience that serve as a sobering wake-up call for any CIO or IT professional concerned about cybersecurity.

  • Virtual currencies and their potential role in cyber crime

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics

    Sponsored by: SearchSecurity.com

    This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • Defending the Indefensible: Preparing for an Uncertain Digital Future

    Sponsored by: LogRhythm, Inc.

    The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.

  • Information Security Asean July 2016

    Sponsored by: SearchSecurity.com

    In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • Unlocking Ransomware, the Lucrative Criminal Business Model: An Analyst Report

    Sponsored by: Palo Alto Networks

    Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organizations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.

  • Your Network: A Look Behind the Firewall

    Sponsored by: Fortinet, Inc.

    Discover ways to diagnose and determine how social media, audio, and video traffic may compromise security in your network. Learn how to run a cyber-threat assessment to ensure your valuable data is kept under lock.

  • Defend Against the Undetected

    Sponsored by: Fortinet, Inc.

    This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.

  • Cyberhunting: A Critical Component of Enterprise Security

    Sponsored by: Infocyte

    Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.