ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Guidance on Healthcare Ransomware Attacks

    Sponsored by: OpenDNS

    Learn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated.

  • Five Important Steps to Ransomware Remediation in Health IT

    Sponsored by: OpenDNS

    Discover five key steps for responding to hospital ransomware attacks within this e-guide. Health IT expert Reda Chouffani will help you better understand the anatomy of ransomware and help you devise a recovery plan if ransomware should strike.

  • Harnessing the Power of Metadata for Security

    Sponsored by: Gigamon

    Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation. Learn how to enable more in-depth security analysis of traffic that is focused on the areas of concern, ultimately resulting in faster time to detection, response, and mitigation.

  • GigaSECURE Security Delivery Platform

    Sponsored by: Gigamon

    Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time.

  • 5 Considerations for Securing Hybrid Clouds

    Sponsored by: Intel Security

    This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.

  • Defining Security for Today’s Cloud Environments

    Sponsored by: Fortinet, Inc.

    Uncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn why organizations need to augment traditional firewalls and security appliances with expanded protection for east-west traffic, both within internal networks and across clouds.

  • Policing cyber crime

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

  • Securing Data Access Within the Healthcare Industry

    Sponsored by: VASCO Data Security International

    Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.

  • Cloud Computing Security Considerations and Requirements

    Sponsored by: Palo Alto Networks

    In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.

  • Analysts Reveal how to Secure SaaS

    Sponsored by: Palo Alto Networks

    This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.

  • Digital Identity Insights: Dangerous Access, IoT Security, and Compliance

    Sponsored by: Certified Security Solutions (CSS)

    Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.

  • TAG Cyber Report: 2017 Security Annual – Vol. 1

    Sponsored by: Digital Guardian

    This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.

  • New Tools Lead to Refined GRC Practices

    Sponsored by: Proofpoint, Inc.

    See why most enterprises still struggle with governance, risk and compliance processes in the digital age. In this e-guide, learn the history of tried and failed document sorting methods and discover new tools, like text analytics and auto-classification that can help compliance practices in the future.

  • How to Conquer Security on the Public, Private, and Hybrid Clouds

    Sponsored by: Fortinet, Inc.

    Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more.

  • The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?

    Sponsored by: SecureWorks

    Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.

  • Companies, Digital Transformation and Information Privacy: The Next Steps

    Sponsored by: Hewlett Packard Enterprise

    The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.

  • The Security Fabric of The Cloud

    Sponsored by: Fortinet, Inc.

    This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat.

  • How to Secure Data Access Within the Healthcare Industry

    Sponsored by: VASCO Data Security International

    Access this white paper to learn the changing role of technology within the health sector and why healthcare organizations continue to experience major data breaches. Discover best practices to help your organization integrate and adopt security without compromising the patient experience.

  • Get Smarter Control of Your Certificates and User Keys Right Now

    Sponsored by: Certified Security Solutions (CSS)

    In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.

  • Penetration Testing Services Data Sheet

    Sponsored by: IBM

    Because high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is clearly required. This data sheet details one group of security professionals whose goal is to help you discover vulnerabilities in your computer networks, hardware, and software applications before criminals do.

  • Rx for Embedding Security into Vulnerable Healthcare Systems

    Sponsored by: Certified Security Solutions (CSS)

    Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage.

  • Deciphering the Tactics of the Enemy: APT-Style Attacks

    Sponsored by: Dimension Data

    In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.

  • How Can Internet Hijacking be Prevented or Mitigated?

    Sponsored by: Dimension Data

    In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.

  • Is FDE Enough to Thwart "Evil Maid" Attacks?

    Sponsored by: Dimension Data

    In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.