ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Five-Step Guide to Implementing Encrypted Traffic Management (ETM)

    Sponsored by: Blue Coat Systems

    Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.

  • Unified Security Management vs. SIEM: a Technical Comparison

    Sponsored by: AlienVault

    Discover a comprehensive overview of SIEM including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.

  • Applying Data Science to User and Entity Behavior Analytics

    Sponsored by: Exabeam

    Discover how to reduce false positives for UEBA, use machine learning to derive network context, and proven techniques from real customer deployments.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    Discover and debunk several pervasive myths about encrypted communications and gain a solid understanding of its growing importance. Read on to answer: do current security measures slow encrypted traffic by up to 80%? Can this encrypted traffic create blind spots in security? And more.

  • Defending the Indefensible: Preparing for an Uncertain Digital Future

    Sponsored by: LogRhythm, Inc.

    The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.

  • 10 REASONS TO TEST, NOT GUESS

    Sponsored by: Trustwave

    This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • SSL Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.

  • The Security Survival Guide for Growing Businesses

    Sponsored by: Trustwave

    This guide shows you step by step why your security may be suffering and offer practical tips for addressing critical points so you can take your data protection to the next level.

  • Online Phishing

    Sponsored by: Navex Global

    Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.

  • REFERENCE GUIDE Acceptable Use Policy

    Sponsored by: Navex Global

    This reference guide outlines the Acceptable Use Policy of computer systems at your organization. It applies to the use of organizational information and computer systems to practice business or interact with internal networks and business systems. Learn about proper uses of proprietary information and what actions have been deemed as unacceptable.

  • Balancing Personalization and Trust in the Age of the Customer

    Sponsored by: Gigya

    Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Read on to find out how such an approach has increased massive increases in usable customer data for companies such as Danone and Forbes.

  • 6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team

    Sponsored by: ThreatConnect

    This paper outlines 6 steps you can take to prioritize threat data, automate manual tasks, and streamline your workflow. With the right tools in place, you can turn your small band of brothers into an army suited to take down all of today's sophisticated threats.

  • Businesses Should Begin Preparing for the Death of the Password

    Sponsored by: Gigya

    Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Read on to discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.

  • IT Security for Retail

    Sponsored by: Trustwave

    This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.

  • The State of Cloud Security: 2016 Survey Results

    Sponsored by: CloudPassage

    Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. In this webcast, view expert analysis of the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

  • Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader

    Sponsored by: Digital Guardian

    The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.

  • Cloud Security 2016 Spotlight Report

    Sponsored by: CloudPassage

    Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. Uncover the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

  • IT Security for Financial Sector

    Sponsored by: Trustwave

    Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next $50 million mistake.

  • How to Harden Your Servers In Elastic Infrastructures

    Sponsored by: CloudPassage

    Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Watch on to see how systems are deployed through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.

  • Trustwave Global Security Report

    Sponsored by: Trustwave

    Understanding the motivations and resources of professional cybercriminals is key to defending against them. This report gives you an inside look at the business behind malware with stats from breach investigations around the world.

  • A DevSecOps Playbook

    Sponsored by: CloudPassage

    There is a fundamental struggle between the speed that cloud services provide and security. In this white paper discover the concept of DevSecOps, a departure from traditional thoughts about speed vs. security.

  • Securing Agile IT: Common Pitfalls, Best Practices and Surprises

    Sponsored by: CloudPassage

    Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general such as security as a "secondary layer", removing layers from the bottom up, reducing attack surface, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.