ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Which Embedded Analytics Tool is Right For You?

    Sponsored by: GoodData

    This report from the Eckerson Group helps you sift through the pile of BI vendors and find the one that's right for your company. Inside you'll find 12 criteria for evaluating embedded analytics solutions, as well as 5 strategies for implementing your new program so you can find the best way to put your data to work for you.

  • IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy

    Sponsored by: SAS

    Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.

  • Preventing internal Cybersecurity Breaches

    Sponsored by: Navex Global

    Get insight from security experts on the various types of cybersecurity threats created by a lack of employee awareness. Learn how to develop an effective cybersecurity training program to prevent and solve potential insider issues.

  • Beyond Next-Gen: Defining Future-ready Endpoint Security

    Sponsored by: TrendMicro

    In this ESG report, discover how to achieve your desired level of high fidelity to get the most out of your endpoint protection. Learn how other organizations are buying their endpoint protection and make determinations for your own endpoint solution moving forward.

  • Mitigate the Threat of Ransomware in Health IT

    Sponsored by: VASCO, INC.

    Hospitals and health systems are prime targets for ransomware attacks, so health IT teams must know how to respond – and quickly. In this e-guide, health IT expert Reda Chouffani shares 5 steps for responding to hospital ransomware attacks, and 10 ways to stop ransomware from targeting your health data in the first place.

  • 6 Ways to Put 'Secure" Back in Secure Web Gateways

    Sponsored by: Trustwave

    Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.

  • Data Analytics Used to Combat the Opioid Epidemic

    Sponsored by: SAS

    Find out how the utilization of predictive analytics contributes to the development of better treatment protocols for the opioid epidemic. Learn how to take action with the comprehensive data management approaches outlined, such as automating data assembly and streamlining report generation.

  • 10 Essential Best Practices for Virtual Server Backups

    Sponsored by: Computerworld Business Solutions

    This e-book explores the specific challenges of creating a data protection and backup strategy for virtual servers. Uncover 10 helpful best practices that will boost your disaster recovery strategy, like making use of hypervisor tools, using snapshots responsibly, and 8 more.

  • How Analytics Help to Fight Tax Fraud

    Sponsored by: SAS

    In this resource Deborah Pianko, a Government Fraud Solutions Architect speaks about how predictive analytics may offer the opportunity to stop tax fraud before it takes place. Learn about predictive modeling, how to incorporate predictive analytics into existing BI programs, 3 things agencies must know about fraud detection, and more.

  • Resume Business Faster with Engineered Oracle Database Recovery

    Sponsored by: Oracle Corporation UK Ltd

    This brief video examines the only backup and recovery system co-engineered with Oracle databases and Oracle cloud. Access now to discover a zero data loss recovery appliance that will minimize the time it takes to recover your databases fully with cloud-connected automated backups that eliminate silos and vastly improve user experiences.

  • Top Three Gaping Holes in Your Data Security

    Sponsored by: Globalscape

    Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.

  • Genius Project Security Guide

    Sponsored by: Cerri.com AG

    Discover the security features you should be looking for in project management software solution. It's important for your project management software to protect your data from attacks while ensuring the availability, integrity and confidentiality.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Insider Security Threats: What CISOs Can Do to Mitigate Them

    Sponsored by: Preempt Security

    Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.

  • Healthcare Data Privacy: 5 Basic Steps to Secure Your Patient Records

    Sponsored by: Xerox

    Discover 5 basic steps to securing EHRs and enacting robust patient information protection. Additionally, get tips on re-thinking your cyber incident response plan to account for new and increasing forms of ransomware that attempt to attack and impact the reputation of your organization.

  • As Healthcare Data Expands, So Should Security

    Sponsored by: Xerox

    Access this post to learn how to ensure data integrity and promote population health management (PHM) initiatives without sacrificing HIPAA compliance.

  • Computer Weekly – 8 November 2016: The march of the robot workers

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.

  • Mitigating Security Risk from Partners, Affiliates and Suppliers

    Sponsored by: Dell SecureWorks

    Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.

  • Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It

    Sponsored by: Globalscape

    Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.

  • Modern Cybercrime: Staying Ahead of The Perfect Storm

    Sponsored by: Trustwave

    Discover how to get ahead of today's cyber threats using simple steps and key strategies. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business.

  • Next Level Threats: Stopping Ransom & CEO Email fraud

    Sponsored by: Trustwave

    Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.

  • Using Metrics to Manage Your Application Security Program

    Sponsored by: Veracode, Inc.

    This SANs resource help you measure your application security (AppSec) program and ensure AppSec is part of your organization's culture moving forward.

  • Assessing Application Security: A Buyer’s Guide

    Sponsored by: Veracode, Inc.

    In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.

  • Top 5 Reasons Why You Need an AppSec Program

    Sponsored by: Veracode, Inc.

    A variety of misconceptions lead to the lag in AppSec adoption, but the reality is you need an AppSec program. Learn the top 5 reasons why in this white paper.

  • Cb Defense: PCI DSS Anti-Virus Assessment

    Sponsored by: Carbon Black

    This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.