ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS

    Sponsored by: Ipoque

    This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.

  • Beware the Invisible Cybercriminals: Cyberespionage and Your Business

    Sponsored by: Kaspersky Lab

    Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire, read our special report and find out more on cybercriminal techniques, common exploited vulnerabilities and more.

  • 2016 Cyberthreat Defense Report

    Sponsored by: Citrix

    This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.

  • Accelerate Your Digital Business Through Cybersecurity

    Sponsored by: Dimension Data

    Tune into this video to discover how to leverage cybersecurity to accelerate your digital business. View now to unleash the power of your data with a secure, digital infrastructure and learn how to utilize actionable threat intelligence.

  • Strengthening Cybersecurity at the Tour de France

    Sponsored by: Dimension Data

    From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.

  • Cybersecurity for the Digital Age: The Essential Guide

    Sponsored by: Dimension Data

    In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • The Key to Protecting Your Business Amid Cybercrime’s Current Boom

    Sponsored by: CA Technologies

    This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.

  • Your Legal Liability Following a Cybersecurity Breach

    Sponsored by: SurfWatch Labs

    This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.

  • Cloud Security Gateways Rise to the Data Loss Challenge

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at cloud data loss prevention, the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection.

  • How Integrated Services Reduce Risk and the Impact of a Security Breach to Organizations

    Sponsored by: Dell SecureWorks

    This white paper presents the advantages of a single-outsourced solution for managed security services and incident response. Discover how combining your capabilities with an MSSP can enable you to improve your overall security by reducing investigation time with real-time data access and enhancing remediation solutions with cyberintelligence.

  • Top 5 IT Challenges Facing Canadian Businesses

    Sponsored by: Rogers Communications, Inc.

    Business success increasingly hinges on a company's ability to use new technology to drive innovation and improve operational efficiency. But IT leaders say their ability to advance the business is challenged. Read this brief white paper to learn about the IT challenges facing businesses today and why IT departments are wasting 200 hours per week.

  • Protect Against Zero-Day Attacks at the Every Level

    Sponsored by: Check Point Software Technologies Ltd.

    It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.

  • Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies

    Sponsored by: TrendMicro

    A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.

  • Formulate a Game Plan for Closing the SecOps Gap

    Sponsored by: BMC

    Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.

  • Report: Modern Threat Intelligence

    Sponsored by: IBM

    The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.

  • Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers

    Sponsored by: LogRhythm, Inc.

    One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.

  • Bullet-Proofing Your Email with Cloud-Based Security

    Sponsored by: LogicNow

    This white paper discusses a cloud-based email security service that protects users with highly accurate spam detection, robust virus defense, and built-in email continuity. Read on to see how this service can improve the reliability of your email security and reduce your management overhead.

  • Mobile Data Security: Finding the Balance for Secure Productivity

    Sponsored by: IBM MaaS360

    In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.

  • Information Security ANZ March 2016

    Sponsored by: TechTarget ANZ

    Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly

  • Information Security Asean March 2016

    Sponsored by: TechTarget ANZ

    Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals

  • PCI Compliance Protect your business from data breach

    Sponsored by: Earthlink.

    Get stronger control over PCI compliance in this white paper by learning the 12 requirements to simplify and accelerate the process. Access this resource now to learn how to proactively protect your organization from a data breach.

  • Computer Weekly – 1 March 2016: Protecting the UK from cyber attacks

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to the National Crime Agency's top cyber cop about tackling IT security threats against the UK through global collaborations. We ask CIOs for their tips on building an IT strategy for the digital age. And we review the big six storage suppliers' plans for all-flash arrays. Read the issue now.

  • Spear Phishing Attacks: Where to Find Them and How to Prevent Them

    Sponsored by: Cloudmark

    This exclusive e-guide discusses the reasons behind why spear phishing attacks are at the heart of most targeted attacks. Access now and you'll uncover advice to help minimize the chance of a spear phishing attack successfully infiltrating the enterprise.

  • Best Practices for Defending Against Spear Phishing Attacks

    Sponsored by: Cloudmark

    This exclusive e-guide details a new wave of spear phishing attacks targeting defense contractors, universities, and security firms. Read on as experts explain how to defend against the man-in-the-email attacks with proper training and little technology.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.