ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • The Mobile Banker Threat - from End to End

    Sponsored by: Check Point Software Technologies Ltd.

    This asset offers an example of one strain of malware which infected Google Play, and shows you how easy it is for it to mutate, grow, and change to beat even advanced AVs. Read on to learn what you should do to protect yourself from these threats.

  • ExpensiveWall: A Dangerous 'Packed' Malware on Google Play that will Hit You in Your Wallet!

    Sponsored by: Check Point Software Technologies Ltd.

    Go inside to learn what makes the new malware found on Google Play, nicknamed "ExpensiveWall" so unique and dangerous, as well as what steps you can take to stay protected.

  • 2017 Veritas GDPR Report Chapter 1

    Sponsored by: Veritas

    According to the Veritas 2017 GDPR Report, 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business.

  • Security Strategies for Success

    Sponsored by: Citrix

    Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.

  • Enterprise Cloud Applications & Services Adoption, Use, and Content and Threats

    Sponsored by: Symantec & Blue Coat Systems

    In this Symantec CloudSOC Shadow Data Report, uncover the key trends and organizations like Shadow Data that enterprises face when trying to ensure their sensitive data in cloud apps remains secure.

  • The SIEM Essentials to Creating Your Own Security Posture

    Sponsored by: Splunk

    Watch this webcast to learn how one of the United States' biggest nuclear research firms puts this SIEM software to work as part of their security posture. Go inside to learn how, by implementing this program, you too can get customizable incident reporting, real time account activity dashboards, and more.

  • Anti-Virus Comparative

    Sponsored by: Symantec & Blue Coat Systems

    Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Key into this white paper to uncover results from the Malware Protection Test and the Exploit Test.

  • How to Quickly Advance Your Security Posture

    Sponsored by: Splunk

    In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.

  • The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack. Then discover a modern protection tool that can do what traditional security programs can't.

  • The Buck Stops Where?

    Sponsored by: BitSight

    By 2020, Gartner estimates that 75% of Fortune 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. In this white paper, gain insight into how data breaches are affecting both large and small businesses and how these businesses can mitigate their risks of future data breaches.

  • Symantec™ Cloud Generation Malware Analysis

    Sponsored by: Symantec & Blue Coat Systems

    Hackers continue to show endless ingenuity in penetrating corporate networks, which means organizations need to fight back harder than ever. By reading this white paper, you'll learn more about malware.

  • Hacking the Smartphone: A Business Email Compromise in Action

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.

  • Data Wars: A New Hope for IT & Security Insights

    Sponsored by: Splunk

    In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.

  • Analytic Stories or; "How I Learned to Stop Worrying and Respond to Threats"

    Sponsored by: Splunk

    This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.

  • All You Need to Know About Microsoft Windows Server 2016 Virtualization

    Sponsored by: Veeam Software

    In this comprehensive e-book you will find examples of how IT Professionals are leveraging Hyper-V PowerShell scripts in their own environments. Learn about the necessary tools to successfully test and manage a Windows Server 2016 Hyper-V environment.

  • A CISO's Guide to Mobile Threat Defense

    Sponsored by: Check Point Software Technologies Ltd.

    Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.

  • Most Wanted Malware: Banking Trojans and Ransomware That Want Your Money

    Sponsored by: Check Point Software Technologies Ltd.

    Read this rundown of the top 10 malwares that tried to steal your money in the summer of 2017.

  • Taking a Fresh Approach to Your User Device Management

    Sponsored by: Centrality

    Technology is always changing, updating, and upgrading. Keeping hardware up-to-date in an era of constant change is no small task. This white paper explores a new approach to user device management that helps overcome the top ten business challenges facing the digital economy.

  • Managing Cloud Sprawl in the Age of Cloud Services

    Sponsored by: Citrix

    While many organizations are adopting multiple cloud deployments, and for good reason, you need to avoid cloud sprawl. You want to benefit from the cloud without putting your sensitive data at risk. Read on to learn about a digital workspace that enables you to avoid cloud sprawl.

  • File Sharing Service Eases IT Migration to Windows 10

    Sponsored by: Citrix

    Download this white paper to discover a file sharing, storage and sync service that will support your mobile workforce's secure data storage and sharing needs for Windows 10 and beyond in terms of security, flexibility, productivity and Office 365 integration.

  • Managed Security Service Provider Selection for Dummies

    Sponsored by: Rackspace

    In this book, you learn how to leverage a managed security services provider to enhance your organization's security posture in the cloud.

  • A Day in the Life of a GDPR Breach

    Sponsored by: Splunk

    This webcast outlines what the GDPR entails, as well as outlines a basic guide for what will happen, and what you should do to mitigate the damage done by a GDPR breach.

  • 6 Steps for Building a Robust Incident Response Function

    Sponsored by: IBM Resilient

    42% of cyber security professionals say their organization ignores a significant number of security alerts because they can't keep up with the volume, according to Enterprise Strategy Group. This white paper discloses 6 steps for building a robust incident response function to ensure your organization keep up with the high security alert volume.

  • Endpoint Security - Market Quadrant 2016

    Sponsored by: Symantec & Blue Coat Systems

    By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.

  • 6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments

    Sponsored by: Alert Logic

    In this e-book, uncover the challenges of achieving continuous PCI DSS compliance across complex multi-cloud landscapes and the 6 criteria to consider when evaluating compliance solutions.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.