ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • Five-Step Guide to Implementing Encrypted Traffic Management (ETM)

    Sponsored by: Blue Coat Systems

    Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.

  • Unified Security Management vs. SIEM: a Technical Comparison

    Sponsored by: AlienVault

    Discover a comprehensive overview of SIEM including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.

  • Applying Data Science to User and Entity Behavior Analytics

    Sponsored by: Exabeam

    Discover how to reduce false positives for UEBA, use machine learning to derive network context, and proven techniques from real customer deployments.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    Discover and debunk several pervasive myths about encrypted communications and gain a solid understanding of its growing importance. Read on to answer: do current security measures slow encrypted traffic by up to 80%? Can this encrypted traffic create blind spots in security? And more.

  • Defending the Indefensible: Preparing for an Uncertain Digital Future

    Sponsored by: LogRhythm, Inc.

    The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • SSL Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.

  • Businesses Should Begin Preparing for the Death of the Password

    Sponsored by: Gigya

    Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Read on to discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.

  • The State of Cloud Security: 2016 Survey Results

    Sponsored by: CloudPassage

    Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. In this webcast, view expert analysis of the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

  • Cloud Security 2016 Spotlight Report

    Sponsored by: CloudPassage

    Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. Uncover the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

  • How to Harden Your Servers In Elastic Infrastructures

    Sponsored by: CloudPassage

    Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Watch on to see how systems are deployed through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.

  • A DevSecOps Playbook

    Sponsored by: CloudPassage

    There is a fundamental struggle between the speed that cloud services provide and security. In this white paper discover the concept of DevSecOps, a departure from traditional thoughts about speed vs. security.

  • Security and Innovation Converge at Open Source Linux

    Sponsored by: Red Hat

    Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.

  • AWS Cautionary Tales and How to Avoid Becoming One

    Sponsored by: Palerra Inc.

    AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.

  • Mobile Threat Prevention Behavioral Risk Analysis

    Sponsored by: Check Point Software Technologies Ltd.

    Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.

  • A CISO’s Guide to Mobile Threat Prevention

    Sponsored by: Check Point Software Technologies Ltd.

    Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.

  • Understand the Hype around Mobile Data Security Threats

    Sponsored by: Check Point Software Technologies Ltd.

    In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.

  • How to get the best protection from your CASB

    Sponsored by: Palerra Inc.

    Discover how two approaches to a Cloud Access Security Broker (CASB) strategy stack up to the major concerns CISOs face on a daily basis, such as sharing security responsibilities with their cloud provider, taming unmanaged traffic from their network, and more.

  • Comprehensive Protection from Advanced Threats Requires Mobile Threat Assessment

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how a mobile threat assessment strategy can provide comprehensive protection against the most vicious and perfidious mobile attacks. Also learn of the myriad attack vectors that threaten mobile devices today, employee involvement in protection, and more.

  • Demystifying Mobile Security Attacks

    Sponsored by: Check Point Software Technologies Ltd.

    Discover the most common types of mobile attacks – Android malware apps, iOS surveillance, MITM, and more – and what you can do in order to detect and prevent them from causing damage.

  • Can a CASB Protect You from the 2016 Treacherous 12? Infographic

    Sponsored by: Palerra Inc.

    Uncover if a Cloud Access Security Broker (CASB) is ideal for your enterprise's cloud security needs. Consult this infographic to see how CASBs measure up against the "Treacherous 12" threats identified by the Cloud Security Alliance, find detailed examples of cloud security issues and strategies relevant to your enterprise, and more.

  • Mobility In Financial Services: A Regulatory Compliance Checklist

    Sponsored by: BlackBerry

    Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.

  • Samsung Research America Secures Intellectual Property from Advanced Mobile Threats

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how Samsung Research America handled the security of their mobile devices with a single, sweeping threat prevention strategy. Discover how they gained an in-depth threat defense, peace of mind, and more.

  • Can a CASB Protect You from the 2016 Treacherous 12?

    Sponsored by: Palerra Inc.

    Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.