ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Spending Research

  • Security Analytics

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • IT Security Trends to Know

    Sponsored by: Cisco Umbrella

    The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.

  • Toolkits, Apps, & Services Used Today to Launch DDoS Attacks

    Sponsored by: A10 Networks

    Find out how attackers launch different types of DDoS so that you can prepare your organization's security strategy to protect the key apps and data on its network.

  • Rules of Engagement: A Call to Action to Automate Breach Response

    Sponsored by: ServiceNow

    This Forester Research report analyzes cybersecurity attacks to provide you with insight on how to address these problems and prevent future attacks.

  • A Guide to Avoiding Financial Losses in Cybersecurity

    Sponsored by: Kaspersky Lab

    77% of U.S. businesses have suffered between 1 and 5 separate incidents of data loss, leakage or exposure in the past 12 months, according to Kaspersky Lab. This white paper reveals the financial woes across the threat landscape.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Sponsored by: ComputerWeekly.com

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

  • 10 Advantages of a Proxy Deployment with a Next-Generation Firewall

    Sponsored by: Symantec

    Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall

  • Malware Review Q1 2017

    Sponsored by: PhishMe

    Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.

  • Report: Your Guide to Today's Threat Landscape

    Sponsored by: Symantec

    Uncover 6 threats to your organization and how they have evolved over the past year, what specific dangers they pose to your enterprise, and what you can do to mitigate their harm.

  • 10 Benefits to Help Combat Ransomware

    Sponsored by: Symantec

    Discover 10 ways an incident response service can help your organization right now if you are, or are ever, infected with ransomware.

  • Internet and Security Threat Report 2017

    Sponsored by: Symantec

    Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.

  • Your Guide to Combating Phishing in 2017

    Sponsored by: PhishMe

    To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.

  • Data Breaches and the Great Security Disconnect

    Sponsored by: PhishMe

    Access this infographic now to learn how to bolster your existing security measures with tools that address growing cyberthreats and empower your employees to be part of the solution.

  • Six Criteria for Buying Data Loss Prevention Products

    Sponsored by: InteliSecure

    Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.

  • Introduction to Data Loss Prevention Tools

    Sponsored by: InteliSecure

    In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.

  • 5 Reasons to Upgrade Your Endpoint Security

    Sponsored by: Symantec

    Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.

  • Dealing with Ransomware, Business Email Compromise and Spearphishing

    Sponsored by: PhishMe

    Phishing, spearphishing, CEO Fraud/BEC and ransomware represent serious threats to any organization. Access this survey report to discover 14 robust cybersecurity best practices that can be implemented to reduce the chances of these threats.

  • Conquer malware: Cloud-based protection, multi-lane Defense, and more

    Sponsored by: Symantec

    Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.

  • Next Generation Endpoint Security: Hype or Hope?

    Sponsored by: Symantec

    Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.

  • GDPR Compliance: From a Compliance Burden to a Security Opportunity

    Sponsored by: Symantec

    Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.

  • How the Hybrid Cloud Changes the Game for Security

    Sponsored by: TrendMicro

    Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.

  • The State of Endpoint Security: Approaches, Opportunities and Conclusions

    Sponsored by: TrendMicro

    Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.

  • Cloud Computing Top Threats

    Sponsored by: HPE and IntelĀ® Corporate

    This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.