ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Utilizing Security Ratings for Enterprise IT Risk Mitigation

    Sponsored by: BitSight

    This white paper highlights a security ratings technology that measures company security performance and provides metrics to help mitigate risk and streamline security operations. Read on to learn how this cloud-based intelligence platform can help your enterprise improve your overall risk management in today's world of dangerous cyber-attacks.

  • Microscope February: Windows 10

    Sponsored by: MicroScope

    Feb ezine: An issue looking at some of the ways distribution is enhancing its position and some advice for those worried about cyber criminals and taxmen

  • Prevent Cybercriminals from Taking Down your Business

    Sponsored by: Microsoft

    This infographic reveals what companies are doing right (and wrong) in their security initiatives, and what it's costing them. Uncover technologies that not only build bigger walls against attacks, but also lock criminals out altogether.

  • Under Attack? 2016 Defenses Escape Compromise

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • SANS- A Proactive Response to Incident Response

    Sponsored by: Blue Coat Systems

    In this white paper, you will discover the keys to lowering IR costs and maximizing ROI, View now and learn how to increase your organization's security level by developing an IR process utilizing manual and basic forensics.

  • Advanced Threat Detection with Machine-Generated Intelligence

    Sponsored by: Prelert

    In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.

  • The CISO Role and the Ups and Downs of Cloud Compliance

    Sponsored by: CloudPassage

    In this exclusive e-guide, you will learn about the shifting roles of the chief information security officer (CISO), as well as how to extend cyber and cloud security concerns beyond your IT department to permeate all layers of leadership. Access this guide in addition to see experts highlight the ups and downs of cloud compliance.

  • What Story Does Your IT Security Tell?

    Sponsored by: Prelert

    In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.

  • Aftermath of a Data Breach

    Sponsored by: Cryptzone

    This resource outlines what to do in the event of a data breach, as well as important steps to take in order to reduce your risk. Read on to learn about important stats regarding data breaches and seven ways to protect against attacks.

  • Secure Your Internal Corporate Networks With ABAC

    Sponsored by: Cryptzone

    In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.

  • Math to the rescue! Try this novel hacking defense

    Sponsored by: Prelert

    This article shows how you can detect malicious activity on your networks through and unlikely strategy – advanced math. Read on to take a closer look at this method of detection, and decide if it can help your organization protect its data.

  • Cyberattacks Mean Big Bills for Businesses

    Sponsored by: TechData Corporation

    In this white paper you will see examples of different businesses' data breaches and how they had to deal with them financially. You will also discover the top causes and consequences of cyberattacks beyond financials.

  • Building Management Systems: The cyber security blind spot

    Sponsored by: ComputerWeekly.com

    The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.

  • Top 6 Dangers of Not Inspecting SSL Traffic

    Sponsored by: A10 Networks

    Encryption can improve message confidentiality and integrity but it may also mask hackers' activities. Access this white paper to learn six additional dangers of not inspecting SSL traffic, and what your business can do to expose threats.

  • New Rules of Data Security Virtual Portal

    Sponsored by: IBM

    This portal is your hub for the latest data security strategies and best practices. Watch this series of informative videos to help shed light on the real world implications of data breaches, the importance of ensuring regulatory compliance and how to leverage best breed security solutions.

  • Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare

    Sponsored by: SecureAuth

    In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • Bolster Network Security for the Latest Social Engineering Tactics

    Sponsored by: WatchGuard Technologies, Inc.

    This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.

  • The Threat Landscape of 2015

    Sponsored by: Forcepoint

    This report examines new technological trends and discusses what these trends mean for your security.

  • Staying ahead of threats with global threat intelligence and automated protection

    Sponsored by: IBM

    In this white paper you will discover how to stay ahead of the ever evolving security landscape and keep your precious data safe.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • 8 Data Threat Trends You Must Defend Against Immediately

    Sponsored by: Forcepoint

    Cyber security now goes far beyond the essential everyday cost of doing business. But great advances invite great risk; find out what experts think you need to do to prepare for what lies ahead in 2016 in this expert resource.

  • Business on the Internet - A Scary Reality

    Sponsored by: LogicNow

    This white paper shows you different methods cybercriminals can use to ruin your business. The vast majority of infections can be attributed to user error falling victim to their tactics.

  • Cyber Risk Intellegence for Credit Unions

    Sponsored by: SurfWatch Labs

    This white paper outlines how credit unions can use cyber risk intelligence to prevent data breaches. Read on to learn how to improve your cyber security practice as well reduce the level of effort needed to protect your financial institution.

  • Cyber Threat Intelligence You Can Immediately Understand and Use

    Sponsored by: SurfWatch Labs

    This brief product overview focuses on a cyber-data analytics solution that transforms data into relevant cyber threat intelligence that can be integrated into any IT environment or application. Read on and discover how this tool can allow your organization to quickly identify and comprehend threats for effective risk management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.