Research Library

Powered by

Cyberterrorism Research

  • Report: 2015 Cybersecurity Intelligence Index

    Sponsored by: IBM

    In this report, you'll uncover the major threats to businesses worldwide over recent years, and how companies can better detect and insulate themselves from future attacks in the face of new technology.

  • Stealth Compliance Strategies

    Sponsored by: Unisys

    Access this guide to find software-defined security strategies that help government and commercial enterprises prevent highly sensitive data, systems, and intellectual property from being compromised.

  • 5 Most Common Types of Malicious Hackers

    Sponsored by: Raytheon|Websense

    This resource examines the five most common types of hackers and reveals how each one operates.

  • Case Study: How a Major Media Organization Fought off Hacktivists

    Sponsored by: Akamai

    This case study tells how a major media company took steps to successfully keep hacktivists at bay and maintain uptime across 19 digital properties.

  • Data Theft Protection: Top 10 Global Risks

    Sponsored by: Raytheon|Websense

    This resource reveals why cyber-attacks have been ranked among the biggest risks organizations face today – and what you can do about it.

  • A Comprehensive Guide to Network Security in 2014-2015

    Sponsored by: Radware

    Access this comprehensive white paper for an in-depth review of what plagued security professionals in 2014, and what will continue to challenge them in 2015.

  • April Information Security - Defending Against the Digital Invasion

    Sponsored by:

    In this issue of Information Security magazine, we cover top cyberthreats and countermeasures to help organizations defend against new and evolving attack techniques.

  • Insight into Hacker Economics

    Sponsored by: Juniper Networks, Inc.

    This webcasts takes a closer look at the current and historical trneds in crybercrime methods and tools and how the market is maturing.

  • Sharing knowledge to tackle online banking fraud

    Sponsored by:

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

  • Terrorist use of the internet

    Sponsored by:

    Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats?

  • CW Buyers Guide To Finance and Insurance

    Sponsored by:

    This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.

  • Accenture Technology Vision 2014

    Sponsored by:

    The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.

  • Global Risks 2014

    Sponsored by:

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • Cybercrime and warfare: All that matters

    Sponsored by:

    Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.

  • Global profiles of the fraudster

    Sponsored by:

    Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.

  • Search Security University: Cyber Security

    Sponsored by:

    Join this University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.

  • Underexposed risks of public Wi-Fi hotspots

    Sponsored by:

    This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.

  • Up-to-the-Minute Global Threat Intelligence

    Sponsored by: IBM

    In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.

  • Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape

    Sponsored by: Hewlett Packard Enterprise

    This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.

  • CW Europe – January 2015

    Sponsored by:

    As we start another new year, we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe.

  • Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation

    Sponsored by: IBM

    Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.

  • Your Personal Web Attack Survival Guide

    Sponsored by: Imperva

    This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.

  • System z, x86, UNIX: Which is more secure?

    Sponsored by: IBM

    Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  • The New Reality of Stealth Crimeware

    Sponsored by: Intel Security

    This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.