ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Next Level Threats: Stopping Ransom & CEO Email fraud

    Sponsored by: Trustwave

    Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.

  • Assessing Application Security: A Buyer’s Guide

    Sponsored by: Veracode, Inc.

    In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.

  • Cb Defense: PCI DSS Anti-Virus Assessment

    Sponsored by: Carbon Black

    This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.

  • Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security

    Sponsored by: Absolute

    Discover why endpoint security is an essential component of a layered security strategy. Monitor and control devices to prevent significant data breaches and safeguard your reputation.

  • Top 6 Security Considerations in Migrating to Microsoft Windows 10

    Sponsored by: Absolute

    Examine 6 of the most important IT security considerations in migrating to Windows 10. Discover how persistent endpoint security tools can help you address these challenges and enable your devices to stay secure beyond the operating system upgrades.

  • Gaining Support for ITAM: Improve IT Operations Through Data Curation

    Sponsored by: BDNA

    Tune into this webinar to learn how to enforce enterprise-wide data consistency and improve IT operations with robust ITAM that transforms multi-source data into actionable business insight.

  • Trends and Tactics: How IT Professionals are Approaching AppSec Today

    Sponsored by: Veracode, Inc.

    Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.

  • Top 10 Data Security Tips to Safeguard Your Business

    Sponsored by: Absolute

    New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.

  • At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

    Sponsored by: Absolute

    Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.

  • Five Principles for Securing DevOps

    Sponsored by: Veracode, Inc.

    Discover how to successfully integrate security with DevOps and learn 5 principles your security strategy must address. Furthermore, understand how DevOps and CI/CD are different from Agile development and how this difference changes the requirements for application security.

  • Five AWS Data Migration Methods to Consider and How to Overcome Common Mistakes

    Sponsored by: UXC Oxygen and Amazon Web Services

    More enterprises are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data isn't straightforward. Examine 5 data migration methods for moving storage to AWS in this expert guide, as well as 4 additional mistakes to avoid when transferring servers and apps to the cloud.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast

    To solve mailbox bloat, CIOs are turning to email archiving solutions—but on-premises archiving is now too difficult to manage. Discover how cloud is changing email archiving, and overcome the capacity shortcomings associated with traditional systems with self-service recoverability, and more.

  • 5 Essentials for Achieving Cloud Archiving Success

    Sponsored by: Mimecast

    Learn five essentials for achieving cloud archiving success, including guidance on how to avoid common misconceptions about cloud email archiving, and how to prepare for e-discovery and litigation with a secure storage solution.

  • The Hour-By-Hour Breakdown of Threat Actors Inside Your Environment

    Sponsored by: Armor

    This infographic shows you an hour by hour breakdown of a threat actor through the typical "secure" environment so you can better understand how they carry out their dastardly deeds. By knowing them better and drafting your own plan of attack, you can best prepare yourself to fight back against cyber fiends.

  • Case Study: Vigilias Expands Telehealth to Rural Communities

    Sponsored by: Ambra

    This brief case study illustrates how Vigilias, healthcare communications provider, overcame its outdated hardware to reduce the cumbersome number of systems, and also seamlessly provide access to studies across disparate EHRs.

  • Drive Innovation with Agile Cloud Medical Imaging

    Sponsored by: Ambra

    Tune into this video to learn how Partners in Health, Memorial Hermann Health System, Barrow Neurological Institute, and the Mayo Clinic were able to streamline healthcare diagnostic image exchange, automate workflow processes, and allow anytime mobile viewing with the cloud.

  • Game Over: 3 Scenarios Where Compliance Isn't Enough

    Sponsored by: Armor

    Discover 3 real-world "game over" scenarios to show you why simply being compliant isn't enough. Learn why compliance is just a basic first step, highlighting the need for real, proactive and ongoing security controls.

  • Security & Compliance Are No Gamble

    Sponsored by: Armor

    Discover how the gaming industry was able to create a more efficient, streamlined flow of processes and get military-grade security for sensitive information. Learn how your organization can reach the same level of compliance and security while allowing authorized parties to access data easily.

  • Block Threats with Multiple Cybersecurity Layers

    Sponsored by: Armor

    Discover how to keep your sensitive data safe and your business up and running without interruptions. Ensure your organization, customers and sensitive data are protected by leveraging a defense-in-depth strategy that is designed with integrated security from the ground up.

  • Four Top Cybercrime Trends

    Sponsored by: IBM

    Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.

  • Reviewing a Year of Serious Data Breaches, Major Attacks and New Vulnerabilities

    Sponsored by: IBM

    Discover which industries were hit hardest in 2015 and what these attacks mean for the future. Learn what steps you can take to prepare your security plan for growing threats in 2016 and beyond.

  • Formulate an Enterprise Storage Capacity Plan that Doesn't Bust Your Budget

    Sponsored by: IBM

    Learn how to formulate a storage capacity plan that won't bust the IT budget; here, you will also find guidance on how to reduce component complexity with the adoption of now-affordable SSDs, all-flash arrays, and storage as a service, so as to accommodate unstructured data growth.

  • The Evolution of Locky Ransomware's Javascript Downloaders

    Sponsored by: Booz Allen Hamilton

    Learn the history of the Locky ransomware virus and how to spot it. Discover how it was created and what you can do to keep it from infecting your systems.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.