ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Checkpoint: Demystifying Mobile Security Attacks

    Sponsored by: Checkpoint Software Technologies

    In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause.

  • Zero Trust on the Endpoint

    Sponsored by: Palo Alto Networks

    There needs to be a paradigm shift for organizations to rethink their security infrastructure. Forrester's Zero Trust model remedies the deficiencies with perimeter-centric strategies and legacy technologies. Learn how to better organize and connect your defenses while preventing the execution of malicious executables and exploits.

  • The Technology Industry 2016

    Sponsored by: ComputerWeekly.com

    Most permanent IT professionals have seen their salaries rise over the past four years, and 15% are reporting pay rises of more than 10%, the Computer Weekly/Mortimer Spinks 2016 survey reveals.

  • Digital Guardian Data Loss Prevention

    Sponsored by: Digital Guardian

    Continue reading this white paper to discover how you can gain the deepest visibility, fine-grained control and the industry's broadest data protection coverage

  • Gartner Report: Best Practices for Detecting and Mitigating Advanced Persistent threats

    Sponsored by: Digital Guardian

    In this white paper, you will learn how to implement specific strategic best practices to detect and mitigate persistent threats and target malware.

  • 5 Ways Your Vendor Risk Management Program Leaves You in the Dark

    Sponsored by: BitSight

    In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.

  • Global Threat Intelligence Report

    Sponsored by: Dimension Data

    This white paper infographic will show you specific instances of cybercrime around the world and against what applications were vulnerable.

  • What Story Does Your IT Security Tell?

    Sponsored by: Prelert

    In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.

  • Building Management Systems: The cyber security blind spot

    Sponsored by: ComputerWeekly.com

    The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.

  • Factoring the Human Element into Your Data Breach Response

    Sponsored by: AllClear ID

    Human nature can derail even the most well-documented and rehearsed breach response plans. Access this white paper to understand the factors that affect your team during a crisis, and the tactics you can incorporate into your plan to ensure a successful breach response operation.

  • The Trust Cost of a Data Breach & How to Prepare

    Sponsored by: AllClear ID

    This report summarizes findings for a sampling of 160 data breach insurance claims, 155 of which involved the exposure of sensitive personal data in a variety of business sectors. The objective for this study is to you understand the true impact of data insecurity.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • Forrester Total Economic Impact (TEI) Study of IBM Security Guardium

    Sponsored by: IBM

    In this white paper you will learn how to improve process efficiency while meeting security and compliance requirements. Continue reading to learn how you can reduce the time and cost of compliance.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • How Enterprises Are Attacking the Cloud Security Challenge

    Sponsored by: CloudPassage

    The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.

  • The Challenge of Keeping IAM Simple

    Sponsored by: Thycotic

    This expert e-guide presents the individual challenges the 4 key IAM roles face as they work to mitigate identity fraud/theft. Continue reading to learn why previous IAM projects have failed and how you can overcome the many challenges your organization faces to simplify your IAM approach.

  • Business on the Internet - A Scary Reality

    Sponsored by: LogicNow

    This white paper shows you different methods cybercriminals can use to ruin your business. The vast majority of infections can be attributed to user error falling victim to their tactics.

  • Building confidence in data security

    Sponsored by: ComputerWeekly.com

    Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.

  • Your Guide to the Art of Delivering Identity Federation

    Sponsored by: Radiant Logic, Inc.

    In this e-book, you will discover how to deliver first-class identity security and federation with stronger authentication and richer authorization. Read on to and find out why federating the identity layer is essential for empowering today's fragmented IAM infrastructures.

  • Sensible one-page thoughts on performance: People at work

    Sponsored by: ComputerWeekly.com

    Ludo Houdenaert, an independent management consultant, offers his thoughts on the dangers of destructive tendencies at work, which he calls 'job viruses'.

  • Healthcare Data Access Compliance

    Sponsored by: ComputerWeekly.com

    Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.

  • Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016

    Sponsored by: ComputerWeekly.com

    In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • The Cost of a Data Breach and Impact of Business Continuity Management

    Sponsored by: IBM

    In this report, view the impact of data breaches and observe cost trends over time. Access this global study to learn how to mitigate the chance of an attack and how proper business continuity management can reduce the costs of data breaches for your organization.

  • Secure, Efficient File-Sharing

    Sponsored by: FinalCode

    This brief video looks at a security system that keeps files safe without altering the way employees share them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.