ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Spending Research

  • Security Analytics

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • IT Security Trends to Know

    Sponsored by: Cisco Umbrella

    The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.

  • A Guide to Avoiding Financial Losses in Cybersecurity

    Sponsored by: Kaspersky Lab

    77% of U.S. businesses have suffered between 1 and 5 separate incidents of data loss, leakage or exposure in the past 12 months, according to Kaspersky Lab. This white paper reveals the financial woes across the threat landscape.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Sponsored by: ComputerWeekly.com

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

  • Malware Review Q1 2017

    Sponsored by: PhishMe

    Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.

  • Your Guide to Combating Phishing in 2017

    Sponsored by: PhishMe

    To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.

  • Data Breaches and the Great Security Disconnect

    Sponsored by: PhishMe

    Access this infographic now to learn how to bolster your existing security measures with tools that address growing cyberthreats and empower your employees to be part of the solution.

  • Six Criteria for Buying Data Loss Prevention Products

    Sponsored by: InteliSecure

    Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.

  • Introduction to Data Loss Prevention Tools

    Sponsored by: InteliSecure

    In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.

  • 5 Reasons to Upgrade Your Endpoint Security

    Sponsored by: Symantec

    Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.

  • Dealing with Ransomware, Business Email Compromise and Spearphishing

    Sponsored by: PhishMe

    Phishing, spearphishing, CEO Fraud/BEC and ransomware represent serious threats to any organization. Access this survey report to discover 14 robust cybersecurity best practices that can be implemented to reduce the chances of these threats.

  • Conquer malware: Cloud-based protection, multi-lane Defense, and more

    Sponsored by: Symantec

    Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.

  • Next Generation Endpoint Security: Hype or Hope?

    Sponsored by: Symantec

    Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.

  • SSL: Get the Best for You and Mitigate Vulnerabilities

    Sponsored by: A10 Networks

    Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.

  • Turning GDPR Compliance into Data Security

    Sponsored by: Commvault

    Discover how to lay a solid foundation for holistic information governance and mitigate the burden of GDPR compliance

  • Your IIoT Security Plan: Risks in Manufacturing

    Sponsored by: Bayshore Networks

    In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.

  • How the Hybrid Cloud Changes the Game for Security

    Sponsored by: TrendMicro

    Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.

  • The State of Endpoint Security: Approaches, Opportunities and Conclusions

    Sponsored by: TrendMicro

    Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.

  • Cloud Computing Top Threats

    Sponsored by: HPE and IntelĀ® Corporate

    This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.

  • How to Prepare for a Cloud DDoS Attack on an Enterprise

    Sponsored by: F5 Networks

    Learn the truth behind cloud DDoS attacks and how an enterprise that uses cloud services could protect itself against such a threat.

  • A Closer Look at Cloud Migration Security Risks

    Sponsored by: F5 Networks

    Explore the security challenges when moving workloads and data into the cloud, and how to mitigate the risks they entail.

  • Fabric vs. Platform Approach to Enterprise Security

    Sponsored by: Fortinet, Inc.

    Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.

  • The CISO as a Transformational Role in Risk Management

    Sponsored by: SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

    Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.