ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • The Human Factor in Security

    Sponsored by: Proofpoint, Inc.

    Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.

  • The Essential Cybersecurity Toolkit for SMBs

    Sponsored by: Datto, Inc.

    SMBs need to spread awareness to employees regarding cyberattacks. Read this e-book to take a deeper look at tactics to help benefit your company when fighting off cybercrimes.

  • The Business Guide to Ransomware

    Sponsored by: Datto, Inc.

    Implement top-notch security software to prevent the loss of data if a ransomware attack occurs. Read this e-book to discover what you can do to avoid or recover from an attack.

  • Taking Managed Services to the Next Level

    Sponsored by: Datto, Inc.

    As the threat landscape changes, security providers must also adapt. In this e-book, learn what it takes to protect against WannaCry and other new attacks, the answer to FAQs about lead generation, Ransomware growth broken down by the numbers, and more.

  • Addressing Today's Endpoint Security Challenges

    Sponsored by: Citrix

    Citrix helps customers manage data protection as business mobility, BYOD and the multi-party workforce transform endpoint security requirements. Read this white paper to find out how implementing Citrix security platforms will enhance your security posture.

  • Insider Threats to Financial Services

    Sponsored by: Recorded Future

    More companies than ever before are seeking insider threat detection and prevention processes and tools. Read this white paper to uncover benefits from insider threat detection as well as prevention processes and tools.

  • Best Practices for Applying Threat Intelligence

    Sponsored by: Recorded Future

    Recent SC Media research reveals that 46% of security pros expect threat intelligence to be a very important part of their strategy. This white paper takes an in-depth look into threat intelligence, one of the most talked-about areas of information security.

  • Remediation and Mitigation for Windows Active Directory Security

    Sponsored by: Quest

    Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.

  • The Role of Automation in Optimizing Network Performance and Security

    Sponsored by: FireMon

    As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.

  • Protecting the Hybrid Cloud from Advanced Threats

    Sponsored by: TrendMicro

    With over $1 billion in revenue attributable to ransomware in 2016, many new ransomware families are designed to target servers, including web servers, file servers, virtual desktops, and even specific business critical file types. Discover how to secure today's servers, whether they're physical, virtual, or cloud-based.

  • Don't Overlook Email When Planning for GDPR Compliance

    Sponsored by: Mimecast

    With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.

  • Automated, Real-time Risk Analysis and Remediation

    Sponsored by: FireMon

    Managing risk within today's enterprise network environments is a significant challenge. This resource uncovers how to bridge the gap between enterprise risk and network teams.

  • What is a Non-malware Attack?

    Sponsored by: Carbon Black

    What is a non-malware attack? Uncover a clear definition, along with a quick example that helps to explain exactly what it can do and why it is so dangerous today.

  • Stopping the Next Ransomware Outbreak

    Sponsored by: Carbon Black

    The spike in ransomware outbreaks in the last two years has left security analysts and administrators searching for better protection. Discover 5 simple tips to prevent a ransomware outbreak at your enterprise.

  • Cost of Cyber Crime Study

    Sponsored by: Hewlett Packard Enterprise

    In this Ponemon Institute report, learn why companies with high security profiles experience an average cost of cybercrime that is much lower than those with low profiles.

  • Ransomware: Defending Against 5 Major Types

    Sponsored by: Commvault

    Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.

  • Overcome Security Barriers to the Cloud

    Sponsored by: Commvault

    Learn how to enable data security features in the cloud to avoid costly data breaches. As a bonus, discover 4 other barriers to the cloud and how to overcome these challenges.

  • The Need for Rapid Security Investigation

    Sponsored by: Splunk

    Often when an issue or unsuspected attack occurs, IT teams find out too late. Explore an analytics-driven approach to security that enables organizations to respond to incidents as soon as possible.

  • Enterprise Cloud Applications & Services Adoption, Use, and Threats

    Sponsored by: Symantec

    This special "Shadow Data Research Report" addresses the challenges faced when securing data in cloud apps and services specific to Shadow. Plus the report covers the potential repercussions of data leakage including compliance and mitigation costs that we guarantee you'll never want to face.

  • Rethink Your Strategy to Defeat Evasive Attacks

    Sponsored by: Palo Alto Networks

    Malware is rapidly changing, and security policies need to change alongside it. Inside, learn about why implementing an analytics-based threat detection system is your best bet at keeping your network safe.

  • Internet Security Threat Report

    Sponsored by: Symantec

    In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.

  • The Future of Threat and Vulnerability Management

    Sponsored by: BMC

    In this Gartner research report, read 3 analyst predictions for the vulnerability management market. Discover key findings, market implications, and recommendations to improve your security posture.

  • Effectively Balancing DevSecOps

    Sponsored by: Flux7

    As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.