ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Marcher Marches On: The Anatomy of a Banker Malware

    Sponsored by: Check Point Software Technologies Ltd.

    Inside, get a breakdown of the mobile banking malware known as Marcher. Learn how Marcher gets into mobile devices using flash phishing, what harm it can cause once inserted into your device, and more.

  • DDoS Emerges as Primary Threat Vector for IoT

    Sponsored by: Arbor Networks

    In this research content, learn why many organizations are turning to a cloud-based DDoS mitigation service with tremendous data scrubbing capacity. Then uncover how past IoT attacks influence organizations to prevent and detect application layer attacks faster.

  • Healthtech And Security: Sharing And Safeguarding Patient Data

    Sponsored by: Absolute

    Learn more about how to prevent cybercriminals from accessing your patient's electronic medical records in Aberdeen Group's HealthTech study.

  • "The Next WannaCry" Vulnerability is Here – Let's Stop it before it's too Late

    Sponsored by: Check Point Software Technologies Ltd.

    Go inside to learn why the WannaCry attack was able to exploit the EternalBlue vulnerability 2 months after a patch was released, where the next big attack might come from, as well as tips you can take to bolster your system now to defend against malware in the future.

  • Research Report: IoT DDoS Attacks Show the Stakes Have Changed

    Sponsored by: Arbor Networks

    How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.

  • A Minute in the Life of Google's Security Infrastructure

    Sponsored by: Google Cloud

    Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.

  • How To Become A Superstar Security Leader

    Sponsored by: Google Cloud

    As companies seek to innovate and engage customers through digital channels, they need superstar security leaders. This report looks at the biggest changes in firms' expectations of their chief information security officers and provides specific examples of how top information security professionals rise to those occasions.

  • The Mobile Banker Threat - from End to End

    Sponsored by: Check Point Software Technologies Ltd.

    This resource offers an example of one strain of malware which infected Google Play, and shows you how easy it is for it to mutate, grow, and change to beat even advanced AVs. Read on to learn what you should do to protect yourself from these threats.

  • Security and Compliance Strategies for Success

    Sponsored by: Citrix

    Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.

  • The SIEM Essentials to Creating Your Own Security Posture

    Sponsored by: Splunk

    Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.

  • How to Quickly Advance Your Security Posture

    Sponsored by: Splunk

    In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.

  • The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.

  • Hacking the Smartphone: A Business Email Compromise in Action

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.

  • Data Wars: A New Hope for IT & Security Insights

    Sponsored by: Splunk

    In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.

  • Analytic Stories or; "How I Learned to Stop Worrying and Respond to Threats"

    Sponsored by: Splunk

    This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.

  • A CISO's Guide to Mobile Threat Defense

    Sponsored by: Check Point Software Technologies Ltd.

    Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.

  • Managed Security Service Provider Selection for Dummies

    Sponsored by: Rackspace

    In this book, you learn how to leverage a managed security services provider to enhance your organization's security posture in the cloud.

  • What does a CISO do now? It's a changing, increasingly vital role

    Sponsored by: SearchSecurity.com

    What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.

  • AWS Security Checklist

    Sponsored by: Amazon Web Services

    Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.

  • Overview of AWS Security: Database Services

    Sponsored by: Amazon Web Services

    While the cloud has improved security overall, AWS, aware that it is a large target for cyberattackers hunting for data, has stepped up to the challenge. This white paper gives you an overview of the database security services that AWS provides.

  • Security at Scale: Governance in AWS

    Sponsored by: Amazon Web Services

    Access this white paper to explore the security and governance features built into AWS services that enable you to incorporate security benefits and best practices in building your integrated environment with AWS.

  • Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR

    Sponsored by: SearchSecurity.com

    In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.

  • Three Reasons a Secure Web Gateway is Vital for your Security Stance

    Sponsored by: Symantec & Blue Coat Systems

    According to IDC, by 2020 there will be 105.4 million mobile workers. With this hike, mobile and web security cannot be compromised. This white paper describes what a secure web gateway (SWG) offers and 3 main reasons it is a vital component of your layered defense strategy.

  • Security Analytics

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • 8 Benefits of SSL/TLS Automation

    Sponsored by: Symantec

    In this resource, discover the 8 benefits of SSL/TLS automation to better manage certificate renewals and installations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.