ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Strengthen Your Defenses Against Cybercrime

    Sponsored by: Mimecast

    Despite the fact that email-borne attacks are a real threat, many organizations aren't confident in their ability to spot or stop one. Read this whitepaper to discover how build a cybersecurity plan that will enhance your email security.

  • How 3 Companies Leverage Machine Data to Improve Security, Solve Business & IT Challenges

    Sponsored by: Splunk

    One of the most important – and often, most overlooked – resources that an organization can tap into to protect from cyberattacks is machine data. Learn how 3 companies are leveraging machine data to protect themselves against the latest cyberthreats and to address IT operations, IoT and business analytics challenges as well.

  • Computer Weekly – 15 August 2017: Tech takes the lead in the Tour de France

    Sponsored by: ComputerWeekly.com

    When watching sports on television you are consistently confronted with a barrage of data, giving insight into the most complicated inner workings of football, tennis, cricket, etc., but never in cycling. Access this week's ComputerWeekly to learn how IoT is being introduced to the Tour de France and what that means for the viewer.

  • Cloud Security: 2017 Spotlight Report

    Sponsored by: Quest

    Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.

  • Black Hat Survey 2017

    Sponsored by: Thycotic

    At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.

  • Stopping Malware and Non-Malware Attacks

    Sponsored by: Carbon Black

    Non-malware attacks have quickly become extremely dangerous and prevalent. In 2016, 97% of organizations were targeted by non-malware attacks. Learn how to use endpoint security technologies to combat all forms of cyberattacks, not just malware.

  • 14 Steps to Protect Your Organization from Ransomware

    Sponsored by: Carbon Black

    Ransomware is on track to be a $1 billion crime in 2017, according to FBI data. That's a substantial increase from 2015, when ransomware was a "mere" $24 million crime. Uncover immediate steps you can take today to protect against ransomware like WannaCry and NotPetya.

  • Cost of Cyber Crime Study

    Sponsored by: Hewlett Packard Enterprise

    In this Ponemon Institute report, learn why companies with high security profiles experience an average cost of cybercrime that is much lower than those with low profiles.

  • Cybersecurity Readiness: 2017 Survey Results

    Sponsored by: Solarwinds MSP

    Survey results suggest that IT providers are confident of their cybersecurity preparedness. But is this confidence misplaced? Learn the results in the report and uncover why overconfidence may be leading to more data security breaches.

  • Big Data Analytics Can Help You Manage Cybersecurity Threats

    Sponsored by: Splunk

    Government organizations are facing a tidal wave of cybersecurity threats – from phishing to SQL injection. While cybersecurity is a priority, agencies are still missing the opportunity of big data analytics. Learn how big data analytics can help you sail the wave of security threats.

  • Resilience: Protecting Against the Unknown CyberSecurity Threats

    Sponsored by: AdvizeX Technologies

    Just as every castle has weak points, so too does every security strategy. Learn the secrets of this data centric security model to build up your fortifications. It is a five layer defense strategy than enhances your organization's resilience against the waves of attackers and plugs the gaps so nothing can seep through.

  • CyberSecurity in 2017: Can Business Really Be Secure?

    Sponsored by: AdvizeX Technologies

    As technology and criminals both advance at lightning speed, can you really be sure that your business is secure? As you introduce tools for productivity, are you also opening yourself to attack? Access this report from cybersecurity expert Sam Cattle.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • How to Create a Cybersecurity Policy for Your Organization

    Sponsored by: HelpSystems

    Discover a 4-step plan to build a cybersecurity policy for your organization. As a bonus, uncover additional resources to create a data breach response plan.

  • How UEBA Reduces the Threat of Insider Data Leakage

    Sponsored by: Veriato, Inc.

    Insider access means an employee can learn where sensitive data resides, the value of that data, and the best times to initiate an attack. This white paper examines how you can stop insider data leaks.

  • Effective Incident Response Through User Activity Monitoring

    Sponsored by: Veriato, Inc.

    The longer a cyber incident remains undiscovered, the more likely it will be that the organization will realize a significant data breach. Explore how to achieve effective incident response through user activity monitoring.

  • How Ransomware is Evolving into the Perfect Crime

    Sponsored by: Barkly

    Ransomware is on the rise. The 2017 WannaCry ransomware attack impacted 300,000 systems in 150 countries, while NotPetya affected 100,000 systems in 65 countries. Access this in-depth webcast to get a full understanding of new ransomware trends.

  • CW Benelux August 2017

    Sponsored by: ComputerWeekly.com

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

  • Securing Industrial IoT Technology: 4 Key Considerations

    Sponsored by: Bayshore Networks

    Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.

  • How to Detect Unknown Malware and Ransomware

    Sponsored by: Splunk

    Explore two analytical strategies that can help you detect unknown malware activity and early signs of compromise in a Windows environment. Discover how these approaches work in real-time to detect advanced threats faster.

  • Spot Cloud Security Strategy Flaws Before It's Too Late

    Sponsored by: HyTrust

    From compliance to encryption, there are many boxes an organization needs check to ensure its public cloud is secure. Use this flow chart to kick start that critical process.

  • Overcome Cloud Security Challenges with These Five Expert Tips

    Sponsored by: HyTrust

    The cloud doesn't have to be less secure than traditional systems. Uncover 5 cloud security tips to ensure your data is safe on the cloud.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • Cisco Umbrella: How does it Improve Security Effectiveness?

    Sponsored by: Cisco Umbrella

    Threat detection and prevention is crucial to the security of your business. Join Steve Martino, CISO of Cisco, and his staff as they explain the value of Cisco Umbrella in improving overall security effectiveness.

  • Cisco Umbrella Investigate: Threat Intelligence Overview

    Sponsored by: Cisco Umbrella

    Enterprises today face huge challenges in information security. Attackers are waiting around every corner to cause damaging breaches. In this brief overview, learn about Cisco Umbrella Investigate, which provides threat intelligence about domains and IPs across the Internet.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.