ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • Veracode Secure Development Survey

    Sponsored by: Veracode, Inc.

    Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.

  • State of Software Security Heading into 2017: Application Security

    Sponsored by: Veracode, Inc.

    Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Access now to solid insights into app security such as security features being applied incorrectly, component vulnerability dangers, and more.

  • Protecting Your Business in the Digital Transformation Journey

    Sponsored by: Hewlett-Packard Enterprise

    As digital transformation shifts the risk landscape, IT security must change with it. In this white paper, discover the nature of this shit, as well as the role mobile devices play in modern security networks, how a BI program can help you build a comprehensive security program, successful strategies used by other mid-market companies, and more.

  • APT-Style Attacks: How Cybercriminals are Using Them

    Sponsored by: WatchGuard Technologies, Inc.

    New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.

  • How to Build a Robust Application Security Governance Framework

    Sponsored by: Veracode, Inc.

    Discover not only how to simply, but also streamline application security. Learn how to ensure that everyone is in-sync, and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.

  • Application Security Beyond SAST and DAST

    Sponsored by: Veracode, Inc.

    Learn about trends in and the future of application security as it stands today and what organizations need to do to secure the most oft-attacked and breached layer of their products: the app layer.

  • 5 Lessons from an Application Security Pro

    Sponsored by: Veracode, Inc.

    Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.

  • Managing Risk and Security at the Speed of Digital Business

    Sponsored by: Veracode, Inc.

    Discover how the increasing adoption of digital business approaches is changing the traditional IT governance and control landscape. Learn how to deal with the degrading authority of central IT organization, cope with the rise of scalability issues, and more.

  • Unified Insights on One Unified Threat Management Market Product

    Sponsored by: WatchGuard Technologies, Inc.

    This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.

  • Tackle Email Fraud with Comprehensive Targeted Threat Protection

    Sponsored by: Mimecast

    This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.

  • How to Seamlessly Integrate Security Into DevOps

    Sponsored by: Veracode, Inc.

    Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments.

  • App Security Can’t Happen Without Developers

    Sponsored by: Veracode, Inc.

    In this report from Forrester learn how to use a combination of people and tools to deliver secure apps. Gain key takeaways such as mitigation costs skyrocket when security issues survive the development process, watching the OWASP Top 10 doesn't help when your app was attacked with No. 11, and more.

  • Using Log Data Streams for Real-Time Analytics: 4 Common Use Cases

    Sponsored by: Logentries

    Explore 4 use cases that exemplify why real-time analytics are critical to performance and user experience. Read on to learn how leveraging analytics to ensure continuous service delivery and uptime can be the keys to your enterprise's success.

  • Wi-Fi is Easy, Secure Wi-Fi is the Challenge.

    Sponsored by: WatchGuard Technologies, Inc.

    In this eBook, learn about the increasing demand for Wi-Fi, and more importantly, how to secure your wireless network.

  • How to Keep Your Organization Safe from Advanced Malware

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.

  • Wireless Security: Keeping Intrusion Prevention Systems Simple and Effective

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how to avoid wrongful classification of devices on your network, keep your wireless secure, and eliminate false alarms and the effort of defining complex rules to identify rogue wireless devices and manually inspecting them.

  • The Digital Certificate: How It Works, Which to Buy

    Sponsored by: SearchSecurity.com

    If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.

  • Email-borne Malware Highlights Danger of Over-reliance on Sandboxes

    Sponsored by: Mimecast North America

    Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have skyrocketed recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast North America

    Learn how the cloud has revolutionized the email archival and what your enterprise can do to ensure its compliance, security, and retrieval capabilities.

  • Five Tactics to Stop Email Attacks

    Sponsored by: Mimecast North America

    Discover the increasing risk and impact of ransomware on the enterprise and what can be done to mitigate its effect. Learn about ransomware attack vectors, the real price of an attack, recent ransomware attacks, and more.

  • Email Security in a Zero Trust World

    Sponsored by: Mimecast North America

    Learn how your security response can't just be reactive and what the most important considerations are when looking to lock down an email strategy. Discover what you need to know about the cloud, new threats, digital businesses, and legacy security from multiple perspectives.

  • Navigating Market Complexity to Fulfill Network Security Requirements

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.

  • Information Security magazine Insider Edition, January 2017

    Sponsored by: SearchSecurity.com

    Security for IoT requires a policy that includes a comprehensive list of devices that need attention and a system for regular IoT security testing.

  • What Trust Can Mean to Your Enterprise's Cloud Policy

    Sponsored by: Entrust, Inc.

    Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.

  • IT Security 101: Think Like A Cybercriminal

    Sponsored by: Solarwinds MSP

    In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the new popular targets for hackers, common weak-points in organization's infrastructure, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.