ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • How To Securely Configure A Linux Host To Run Containers

    Sponsored by: Twistlock, Inc.

    Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.

  • The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security

    Sponsored by: Twistlock, Inc.

    Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.

  • How to Use Detection and Response to Reduce Business Risk

    Sponsored by: Dell SecureWorks

    Use this white paper to learn how you can reduce the impact of threats to your organization by leveraging security monitoring systems to improve response times, proactively respond to breaches, and more.

  • The Top Cyber Security Trends in ANZ in 2017

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.

  • 5 Questions Executives Should Be Asking Their Security Teams

    Sponsored by: Microsoft

    This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell and Microsoft

    Click inside to find the major trends and drivers forcing organizations to change or adopt new security procedures in the wake of evolving threats.

  • Computer Weekly – 18 July 2017: Airbus secures critical infrastructure

    Sponsored by: ComputerWeekly.com

    This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient.

  • The Top Cyber Security Trends in ASEAN in 2017

    Sponsored by: ComputerWeekly.com

    For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.

  • Top 5 IoT Deployment Best Practices

    Sponsored by: Hewlett Packard Enterprise

    Overcome potential barriers to IoT adoption by uncovering 5 best practices for creating successful IoT deployments with end-to-end network security, automatic app performance optimization, smart monitoring of wired and wireless infrastructure, and more.

  • How the Internet of Things Is Transforming Industries and the Nature of Work

    Sponsored by: Hewlett Packard Enterprise

    Jeff Kaplan, managing director and founder of THINKstrategies, provides his expert insight into what the IoT is all about, including the benefits and challenges you can expect. Learn how to create a digital workplace via IoT, how the IoT increases your security risks, and much more.

  • Protecting Your Servers in the Cloud Era

    Sponsored by: TrendMicro

    While virtualization and cloud computing can help your organization achieve significant savings while improving business agility, security in these new environments can be a challenge. Explore how you can protect your servers in the cloud age.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

  • modusCloud Email Security URL Defense

    Sponsored by: Vircom

    Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.

  • Print security: An imperative in the IoT era

    Sponsored by: ComputerWeekly.com

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

  • The Next Security Frontier: Automation, Things and Intelligent Machines

    Sponsored by: IBM

    How can you effectively match the progress of emerging threats even within the newest, most promising areas of security, such as AI and DevSecOps? Register for this virtual conference taking place on June 27th 2017, 8:15am – 5:00pm EDT, and get the answers you're looking for.

  • Identify, Connect, and Protect Mobile and IoT at the Edge

    Sponsored by: Aruba Networks

    Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.

  • Leveraging Multi-factor Authentication to Power Protection

    Sponsored by: Centrify Corporation

    According to Verizon's 2016 DBIR, 63% of confirmed data breaches last year involved weak, default or stolen passwords. In this e-book, discover how to leverage multi-factor authentication to power protection.

  • How to Detect & Respond to a Petya Ransomware Attack

    Sponsored by: AlienVault

    On June 27th 2017, a new "Petya-like" form of ransomware spread from Ukraine to wreak havoc around the globe, crippling thousands of computers. Access this white paper to learn the 5 things we know for sure about this new threat and 5 steps to can take to respond to it.

  • 6 Best Practices for Securing AWS Environments

    Sponsored by: Centrify Corporation

    Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.

  • Your In-Depth 2017 Cybersecurity Report

    Sponsored by: Comstor

    Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.

  • The Impact of Data Breaches on Reputation and Share Value

    Sponsored by: Centrify Corporation

    Discover how IT practitioners view the impact of data breaches on reputation and share value. Step into their shoes to learn more about the correlation between security posture ad brand reputation, customer concerns for privacy and data security, and more.

  • Become a Champion of PCI Compliance by Minimizing Your Attack Surface

    Sponsored by: Centrify Corporation

    Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.

  • 6 Best Practices: Privileged Access Security for AWS

    Sponsored by: Centrify Corporation

    This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.

  • 6 Best Practices: Privileged Access Security for AWS

    Sponsored by: Centrify Corporation

    This infographic reveals 6 best practices for implementing and extending AWS security best practices to the cloud. Learn why you should Establish a common security model, consolidate identities, and 3 more ways to securely migrate a cloud environment.

  • Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication

    Sponsored by: Centrify Corporation

    Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.