ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • Primer for Protection Against Cyberattacks: Business Email Compromise

    Sponsored by: TrendMicro

    In this primer, learn how business email compromise (BEC) attacks make inroads to businesses of all sizes. Then explore some strategies on how you can avoid becoming a victim of this scam.

  • Top 3 Challenges Your Team Faces when Building in the Cloud

    Sponsored by: TrendMicro

    In the pages ahead, delve into the 3 major challenges that security teams face when moving into the cloud so that you know how to avoid or overcome them on your path to cloud adoption.

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • What You Need to Know About the General Data Protection Regulation (GDPR)

    Sponsored by: Rapid7

    In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.

  • Using AI, Machine Learning and Other Advanced Technologies to Stay Ahead of Cybercrime

    Sponsored by: Juniper Networks, Inc.

    In this study, research specialist Vanson Bourne interviewed 400 IT and security professionals to learn how they're putting new technologies like AI and machine learning to strengthen existing security procedures.

  • The Complete Guide to Building a Security Culture

    Sponsored by: Trustwave

    IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.

  • Q&A: How to Think Smarter About Database Security

    Sponsored by: Trustwave

    Inside this Q&A with Raul Gutierrez, principal global security architect at Trustwave uncovers steps to take to maintain compliance with the new data protection and privacy laws, and help eliminate vulnerabilities in your environment.

  • 9 Best Practices for Active Directory Security

    Sponsored by: Quest

    This e-book explores how a typical insider threat unfolds, and details 9 critical security best practices that minimize the risk of the internal threat to your Microsoft Active Directory Systems.

  • Securing Azure Active Directory: Detection and Alert

    Sponsored by: Quest

    Once you've established the baseline for Azure AD security, the next step is to detect when and how changes are made. This white paper highlights four methods with which you can do this. Read on to gain guidance on detecting and alerting on changes to Azure AD groups, using sign-in risk detection, and more.

  • Building Effective Azure Active Directory Practices

    Sponsored by: Quest

    In this white paper, you'll examine a four-phase plan for developing effective Azure Active Directory security, focusing in particular on the first phase—continual assessment. Read on to learn how to perform continual assessments of role membership, security verification methods, groups, and more.

  • Protecting Users and Data with Cloud Security

    Sponsored by: Cisco Umbrella

    In this e-book, learn more about how your educational institution can build a holistic, multi-layer defense against ransomware attacks (especially in regards to protecting against email and Web-based threats).

  • Security and Compliance Strategies for Success

    Sponsored by: Citrix

    Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.

  • Analytical Stories: How I Learned to Stop Worrying and Respond to Threats

    Sponsored by: Splunk

    This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.

  • A CISO's Guide to Mobile Threat Defense

    Sponsored by: Check Point Software Technologies Ltd.

    Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell India

    65% of devices lack data protection capabilities according to this Forrester Research infographic. Is your IT security affecting your workforce productivity?

  • The Human Side of IT Security

    Sponsored by: Dell India

    Humans will never be perfect, and human error can often lead to costly data breaches. It is for this reason, that many companies are going beyond simply investing in more expensive technology to solve their security issues, but also putting the strategies you can read about in this white paper to work to create a "culture of security".

  • Cloud Secure Virtualization Datasheet

    Sponsored by: IBM

    Download this sheet to get the technical rundown on a cloud infrastructure that addresses in-house security needs with automated compliance controls and data security for virtualized cloud workloads. You'll learn how to establish virtual workload security down to the microchip level, and more.

  • Ready for the GDPR? Think Again

    Sponsored by: Veritas

    This report looks to highlight the vital areas where organizations are going wrong, and what steps they can take to get into compliance with the GDPR set to go into effect in May of 2018.

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • Is DNS Your Security Achilles Heel?

    Sponsored by: Akamai Technologies

    This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.

  • GDPR: What Healthcare Organizations Everywhere Need To Know

    Sponsored by: Absolute

    Enforcement of the new EU GDPR rules is slated to begin in May 2018 and what they require should compel healthcare organizations to start preparing now. Inside, discover 10 recommendations to get started with GDPR compliance.

  • The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure

    Sponsored by: Google Cloud

    Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.

  • 4 Steps That Help You Protect Your Business

    Sponsored by: Ricoh - HarveyDavid

    As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.

  • GDPR Breach Notification Rule Could Complicate Compliance

    Sponsored by: Lepide Software

    Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.