ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Rx for Embedding Security into Vulnerable Healthcare Systems

    Sponsored by: Certified Security Solutions (CSS)

    Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage.

  • A Certified Concern

    Sponsored by: SearchSecurity.com

    Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.

  • Connected Health Cloud: Focus on Healthcare Solutions NOT Infrastructure

    Sponsored by: CloudMine

    This short resource acknowledges that the nature of healthcare is changing. Connectivity is increasingly mandatory, but degradation of security is out of the question. Access now to see how a connected healthcare ecosystem can thrive on the cloud, despite the particular needs of the industry.

  • The Changing Workforce: Automation & the Role of Ex-Hackers

    Sponsored by: Radware

    The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Best Practices for Writing Secure iOS and Android Apps

    Sponsored by: Proofpoint, Inc.

    As mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes.

  • NSS Labs 2016 Breach Detection System (BDS) Group Test Results

    Sponsored by: Fortinet, Inc.

    Expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection.

  • Public Key Infrastructure: The New Best Practices

    Sponsored by: Certified Security Solutions (CSS)

    This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.

  • Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps

    Sponsored by: Proofpoint, Inc.

    Attackers have adapted to the mobile environment. Discover 18 examples of how curated app stores are failing to protect enterprises from malware and dangerous apps, and cannot provide compliance or privacy protection.

  • Public Key Infrastructure: Traditional Deployments vs. IoT PKI

    Sponsored by: Certified Security Solutions (CSS)

    This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.

  • Containerization Alone Cannot Defend Against Dangerous And Malicious Apps

    Sponsored by: Proofpoint, Inc.

    In this white paper learn the myth about containerization on a BYOD device. Discover several security scenarios on app-based breaches including: network profiling apps, VPN hijacking apps, data mining apps, and more.

  • Report: The Impact of Security Threats on Business

    Sponsored by: Radware

    In the following report, executives underscore just how expensive it is to recover from a cyber-attack. Learn where organizations are continuing to take action despite major revenue losses, and what more can be done.

  • To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise

    Sponsored by: Radware

    Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.

  • 6 Crucial Incident Response Policy Mistakes to Avoid

    Sponsored by: Delta Risk

    Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.

  • The Benefits of Conducting a Network Security Overview

    Sponsored by: Gigamon

    By preventing rogue projects from proliferating, and adopting a holistic approach to security, you can begin to prove the value of the security team. Access this e-guide to learn more about the benefits of conducting security overviews of every enterprise initiative and tightening up your enterprise's cybersecurity practices.

  • The Enterprise Network Firewall Market

    Sponsored by: Fortinet, Inc.

    Discover how NGFWs have added new features, what roles they play in network security functions today, and what place they have in future security developments. Also learn the strengths of specific NGFWs, as well as cautions for their use.

  • How GuideStar Stabilized Website Availability by Blocking Bad Bots

    Sponsored by: Distil Networks

    Learn how GuideStar countered their invasive bot problem, stabilized their site to recover 99.7% uptime, and still allowed good traffic to get through unhindered. Also discover how they saved 20 hours a month of IT effort and reigned in an out-of-control issue that seemed insurmountable.

  • How Graphiq Blocked Bot Data-Scrapers & Improved SEO

    Sponsored by: Distil Networks

    Uncover not only how to block bot data-scrapers, monitor suspicious activity, and eliminate spikes in traffic, but also how to significantly improve the user experience. Also learn how to deploy an automatically updating "known violators" database to keep up with the latest threats.

  • Give Your Threat Counter-Measures a Shot in the Arm

    Sponsored by: Fortinet, Inc.

    Discover a deep (but concise) look at the current evolution of the modern security landscape: giving a succinct rundown of why attacks are stronger than ever, how to develop a strategic defense, and what to look for in solutions. Gain actionable insight into prevention, detection, mitigation, and more.

  • TVH Case Study on increasing Mobile Security Solutions

    Sponsored by: MobileIron

    This case study details how TVH found a trustworthy EMM solution that was able support multiple operating systems. Learn how they were able to: maximize employee productivity while containing IT costs, automatically assign individuals network permissions best-suited to their needs, allow for easy-access to third-party productivity apps, and more.

  • Secure Locations for Your IT Platforms

    Sponsored by: BT

    It is critical to maintain the balance between critical business data upkeep and facility security to host your IT systems. Learn about the cloud's role in making your network secure, sufficient, and sustainable while maintaining that necessary balance.

  • The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls

    Sponsored by: Palo Alto Networks

    This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.

  • Technology, Training Team Up to Defend Endpoint Security

    Sponsored by: SearchHealthIT.com

    Learn how technology can help improve endpoint security in healthcare facilities through expert advice and tips from the field.

  • BYOD & MDM: Why you’re still at risk – and what you can do about it

    Sponsored by: Proofpoint, Inc.

    In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.