ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • How to Make the Most of your Detection and Response

    Sponsored by: Respond Software

    Learn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.

  • Adapt Security for Hybrid Cloud Environments

    Sponsored by: Citrix

    In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.

  • Automation in Cybersecurity

    Sponsored by: Juniper Networks

    During his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.

  • New Cloud Threats to Watch Out for in 2018

    Sponsored by: Juniper Networks

    Safeguarding your critical data is getting harder as threat actors embrace the advantages, and missteps, of cloud. Inside this expert guide, Kathleen Richards details what to watch out for in 2018.

  • Information Security: Companies Aren't the Only Ones Migrating to Cloud

    Sponsored by: TechTarget Security

    Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.

  • The time is ripe to implement cybersecurity automation

    Sponsored by: TechTarget Security

    It's past time to implement cybersecurity automation. Learn what automation can do for your IT defenses and how to get started in our latest handbook.

  • Mobile security trends point to unifying policy and tools

    Sponsored by: TechTarget Security

    Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management.

  • 5 Overlooked Windows 10 Security Risks

    Sponsored by: VMware

    Windows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook.

  • Five Principles for Securing DevOps

    Sponsored by: Veracode, Inc.

    Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.

  • Botnet attacks are evolving; your defenses must too

    Sponsored by: AppGuard

    Botnet attacks will expand and evolve. The best way to fight back is to stop searching for the perfect botnet-protection tool and layer defenses instead.

  • How to update, automate your IR processes

    Sponsored by: Booz Allen Hamilton

    In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.

  • How SMBs are Changing their Security Tactics

    Sponsored by: Booz Allen Hamilton

    Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.

  • What GDPR privacy requirements mean for U.S. businesses

    Sponsored by: TechTarget Security

    Enforcement of the EU's new GDPR privacy regulations is imminent, and potential fines send a clear message to companies to protect their customers, or else.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: TechTarget Security

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • The Tug of War Between UBA and SIEM

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.

  • Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape

    Sponsored by: Juniper Networks, Inc.

    This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.

  • Buyers Guide: Network Security Management

    Sponsored by: Palo Alto Networks

    When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.

  • The Case for Modern SOCs

    Sponsored by: TechTarget Security

    In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.

  • What does a CISO do now? It's a changing, increasingly vital role

    Sponsored by: TechTarget Security

    What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.

  • Logrythm's Security Analytics Platform: Product Overview

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.

  • SIEM Analysis for Security Professionals

    Sponsored by: LogRhythm, Inc.

    This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.

  • Managing Access to Keep Privileged Users' Credentials Secure

    Sponsored by: TechTarget Security

    Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list.

  • Why Security in DevOps is Essential to Software Development

    Sponsored by: TechTarget Security

    What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.

  • How to Increase Security for your Login on Mobile Applications

    Sponsored by: IBM

    In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.

  • Owner-controlled PKI: The Next Step in Securing IoT

    Sponsored by: DigiCert

    Learn how owner-operated PKI is making strides in becoming the most secure option for IoT users.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.