Research Library

Powered by

Security Policies Research

  • Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts

    Sponsored by: Appthority

    This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

  • From IoT to IDoT: Securing the Identity of Things

    Sponsored by:

    With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks. In this issue of Information Security, we discuss the Identity of Things problem, and how you can solve it.

  • 10 Principles of Database Security Program Design

    Sponsored by: Trustwave

    Learn 10 solid principles of database security program design, giving your enterprise a leg up in protecting its customer information, intellectual property, and proprietary secrets.

  • Your MSSP Decision Guide

    Sponsored by: Trustwave

    Discover key questions and considerations to help you select a Managed Security Services Provider (MSSP) and evaluate their solutions to better secure your business. Access now to find how much global reach your MSSP should have, what it means to have security expertise, and more.


    Sponsored by: Symantec

    Discover what can be done to steel a website to malware and data breach attacks with comprehensive website security. Also uncover a breakdown of notable security events in 2015, and analyze key takeaways from real attacks on systems just like yours.

  • Streamlining Security Incident and Vulnerability Response

    Sponsored by: ServiceNow

    The biggest obstacles to achieving "incident response excellence" are security and IT tool integration and coordinating incident response. Learn how the right security operations solution could simplify the coordination of incident response measures, effectively reducing your time-to-response.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by:

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Simple Steps to Evolving Your Website Security in 2016

    Sponsored by: Symantec

    Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.

  • Why Code Signing Is an Essential Website Security Feature

    Sponsored by: Symantec

    Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.

  • It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security

    Sponsored by: Alert Logic

    Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.

  • Answering 10 Essential Questions About Website Security

    Sponsored by: Symantec

    Even though SSL/TLS certificates and vulnerability scans are a crucial part of website security, they're no longer enough. Are you going beyond the basics? Read on to ascertain the strengths and weaknesses of your current website security strategy by asking yourself 10 crucial questions.

  • Cyber Attackers Follow Companies into the Cloud

    Sponsored by: Alert Logic

    Learn the trends of cloud security, what the data from over 80,000 security incidents have taught, and what the future might hold for safeguarding your data in the cloud.

  • Critical Security and Compliance Considerations for Hybrid Cloud Deployments

    Sponsored by: Hewlett Packard Enterprise

    Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.

  • Bringing IT and Security Together for Better Breach Response

    Sponsored by: ServiceNow

    Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your remediation efforts quicker and more efficient, while improving the clarity of your network security status.

  • Policing cyber crime

    Sponsored by:

    This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

  • Get Smarter Control of Your Certificates and User Keys Right Now

    Sponsored by: Certified Security Solutions (CSS)

    In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.

  • Penetration Testing Services Data Sheet

    Sponsored by: IBM

    Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

  • The General Data Protection Regulation Challenge

    Sponsored by: Close Brothers Technology Services

    This paper examines some of the problems caused by The General Data Protection Regulation and how it can be used as a catalyst for improvements in security. Find out how you'll be able to turn compliance with this new legislation into an opportunity for to improve data portability, retention, classification and more.

  • The Changing Workforce: Automation & the Role of Ex-Hackers

    Sponsored by: Radware

    The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.

  • Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration

    Sponsored by: Dell Software

    This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.

  • Your Blueprint to Securing Your Public and Hybrid Cloud

    Sponsored by: Fortinet, Inc.

    Access this white paper and discover how you can securely scale protection to your cloud infrastructure and workloads, and segment both within the cloud and between endpoints, enterprise networks, and the cloud to keep your data safe.

  • Deciphering the Tactics of the Enemy: APT-Style Attacks

    Sponsored by: Dimension Data

    In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.

  • Is FDE Enough to Thwart "Evil Maid" Attacks?

    Sponsored by: Dimension Data

    In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.