ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • Your Quick Reference Guide to Always-On SSL

    Sponsored by: Symantec

    Learn in quick and easy bullet points and infographics what Always-On SSL is, why it works, and what it can do for your organization.

  • Your MSSP Decision Guide

    Sponsored by: Trustwave

    Discover key questions and considerations to help you select an MSSP and evaluate their solutions to better secure your business. Access now to find how much global reach your MSSP should have, what it means to have security expertise, and more.

  • Top 5 SSL Attack Vectors

    Sponsored by: Symantec

    Discover not only the basics of SSL vulnerabilities, but what your enterprise can do to avoid the top 5 hazards that so many organizations fall prey to when deploying encryption.

  • Not All Certificate Authorities are Created Equal

    Sponsored by: Symantec

    Learn the importance of continual hardening of the infrastructure that protects cryptographic keys and securing the authentication process that validates identity. Uncover how to maximize SSL encryption effectiveness, utilize daily penetration testing, and create a secure certificate authorities environment.

  • Designing a Multilayered, In-Depth Defense Approach to Authentication

    Sponsored by: Dell Software

    This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Uncover features you should look for in third-party solutions to supplement native security mechanisms.

  • Streamlining Security Incident and Vulnerability Response

    Sponsored by: ServiceNow

    Discover vital shortcomings in the way IT defends itself from incidents and breaches, and how to shore up your own defenses. Learn how to integrate security and IT tools while coordinating incident response, reducing time-until-response, and remediate issues quickly.

  • Focus: Securing new technology

    Sponsored by: ComputerWeekly.com

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • To Increase Downloads, First Instill Trust: Security Advantages of Code Signing

    Sponsored by: Symantec

    Malware poses a serious threat to the mobile environment: malicious code can slip into app stores and become a threat to anyone who downloads them. Discover how code signing enables end users to take advantage of the ease and convenience of content distribution—without worrying about security consequences.

  • How Status Quo Creates Security Risk - The State of Incident Response

    Sponsored by: ServiceNow

    Learn what was found after the current practices and challenges associated with incident response processes and technologies are evaluated from thousands of respondents all over North America.

  • Simple Steps to Evolving Your Website Security in 2016

    Sponsored by: Symantec

    Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.

  • Why Code Signing Is an Essential Website Security Feature

    Sponsored by: Symantec

    Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.

  • Understanding Shared Responsibility for Microsoft Azure

    Sponsored by: Alert Logic

    Discover your enterprise's relationship with Azure for IaaS, PaaS, and both Microsoft's and Azure's Active directories. Also learn 7 Azure best practices.

  • It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security

    Sponsored by: Alert Logic

    Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.

  • Answering 10 Essential Questions About Website Security

    Sponsored by: Symantec

    Even though SSL/TLS certificates and vulnerability scans are a crucial part of website security, they're no longer enough. Are you going beyond the basics? Read on to ascertain the strengths and weaknesses of your current website security strategy by asking yourself 10 crucial questions.

  • Insider Threat Spotlight Report

    Sponsored by: Dell Software

    The increase in insider data theft highlights the need for better security practices. In fact, 40% of organizations don't even have the ability to detect insider threats. Access this spotlight report on insider threats to uncover more key trends that demonstrate the magnitude of this risk, and what you can do to prevent it.

  • Cyber Attackers Follow Companies into the Cloud

    Sponsored by: Alert Logic

    Learn the trends of cloud security, what the data from over 80,000 security incidents have taught, and what the future might hold for safeguarding your data in the cloud.

  • Protected to Innovate: Securing Your Hybrid Cloud

    Sponsored by: Hewlett Packard Enterprise

    Discover how to remove the risky barriers to digital innovation by determining the right mix of hybrid cloud for your IT infrastructure strategy. Access the freedom and flexibility cloud offers by learning 3 security-first principles that will ensure your hybrid cloud is as productive as it is secure and compliant.

  • Critical Security and Compliance Considerations for Hybrid Cloud Deployments

    Sponsored by: Hewlett Packard Enterprise

    Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.

  • Reeling in Ransomware Data Protection for You and Your Users

    Sponsored by: Code42

    In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.

  • 2016 Cost of Data Breach Study: Impact of Business Continuity Management

    Sponsored by: IBM

    The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)

  • Battling Malware, Intrusion, and Insider Threats with Endpoint Data Protection

    Sponsored by: Code42

    With the growing popularity of third-party apps and BYOD initiatives, it's becoming increasingly difficult to secure your data from malware. Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval.

  • Security Information and Event Management (SIEM) Orchestration

    Sponsored by: Intel Security

    This document takes a deep look at one SIEM tool, and examines how it optimizes incident response processes. Explore ways to block threats more effectively, identify compromises, implement quick remediation, and more.

  • SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results

    Sponsored by: Intel Security

    A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.

  • Bringing IT and Security Together for Better Breach Response

    Sponsored by: ServiceNow

    Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your remediation efforts quicker and more efficient, while improving the clarity of your network security status.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.