ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Enterprise Defense at the Speed of Data

    Sponsored by: ThreatConnect

    Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.

  • Cisco Umbrella Shoots for Secure Internet, Anywhere

    Sponsored by: Cisco Umbrella

    Discover how to mitigate risks and improve your security posture for the cloud by leveraging SaaS-based tools that enable advanced malware protection for your network, real-time threat intelligence, and increased DNS gateway security.

  • Yelp Customer Story: Secure Content with Threat Intelligence and Automated Protection

    Sponsored by: Cisco Umbrella

    Discover how Yelp fosters trust between their users and its online content by preempting potentially dangerous malware attacks and other threats with cloud-delivered automated protection and integrated threat intelligence.

  • Internet Security Threat Report

    Sponsored by: Symantec

    In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.

  • How to Become a Superstar Security Leader

    Sponsored by: Google Cloud

    Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • Secure Cellular Connectivity Empowers BlueNRGY's Global Reach

    Sponsored by: Aeris

    IoT and machine-to-machine (M2M) connectivity enables networks to overcome critical issues like interrupted services, security breaches, and high implementation and maintenance costs. Discover how BluNRGY enabled secure cellular connectivity for IoT in 190 countries and with more than 550 carriers.

  • Securing Industrial IoT Technology: 4 Key Considerations

    Sponsored by: Bayshore Networks

    Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • Mobile Application Security: Discovering Leaks and Remediation

    Sponsored by: WhiteHat Security

    25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.

  • A Look at the Shared Responsibility Model for Cloud Providers

    Sponsored by: SolarWinds, Inc.

    Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots.

  • Sleeping with the Enemy: Achieving Agility and Security with DevSecOps

    Sponsored by: WhiteHat Security

    To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.

  • Secure Coding Practices: Avoid SQL Injection

    Sponsored by: WhiteHat Security

    SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.

  • Don't Just Respond – Prevent Attacks before They Happen

    Sponsored by: Cisco Umbrella

    Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.

  • Unified Endpoint Management for Dummies

    Sponsored by: IBM

    Learn about unified endpoint management (UEM) and how it helps you manage and secure the growing number of devices, apps, and data within your organization. Discover 5 core features of effective UEM, how to monitor endpoints and end-users, how to protect content and proprietary data, and more.

  • How To Securely Configure A Linux Host To Run Containers

    Sponsored by: Twistlock, Inc.

    Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.

  • The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security

    Sponsored by: Twistlock, Inc.

    Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell EMC and Intel®

    In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more.

  • Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR

    Sponsored by: ComputerWeekly.com

    Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell EMC and Intel®

    65% of devices lack data protection capabilities according to this Forrester Research infographic. Is your IT security affecting your workforce productivity?

  • CW ANZ – July 2017: Cyber security plan bears fruit

    Sponsored by: ComputerWeekly.com

    Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape.

  • It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web

    Sponsored by: Authentic8, Inc.

    Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.

  • Why a Virtual Browser is Important For Enterprise Security

    Sponsored by: Authentic8, Inc.

    More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.

  • Improving Endpoint Security and Signature-Based Detection

    Sponsored by: Sentinel Labs, Inc.

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.

  • How the Internet of Things Is Transforming Industries and the Nature of Work

    Sponsored by: Hewlett Packard Enterprise

    Jeff Kaplan, managing director and founder of THINKstrategies, provides his expert insight into what the IoT is all about, including the benefits and challenges you can expect. Learn how to create a digital workplace via IoT, how the IoT increases your security risks, and much more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.