ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies White Papers

  • What You Need to Know About the General Data Protection Regulation (GDPR)

    Sponsored by: Rapid7

    In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.

  • Using AI, Machine Learning and Other Advanced Technologies to Stay Ahead of Cybercrime

    Sponsored by: Juniper Networks, Inc.

    In this study, research specialist Vanson Bourne interviewed 400 IT and security professionals to learn how they're putting new technologies like AI and machine learning to strengthen existing security procedures.

  • The Complete Guide to Building a Security Culture

    Sponsored by: Trustwave

    IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.

  • Q&A: How to Think Smarter About Database Security

    Sponsored by: Trustwave

    Inside this Q&A with Raul Gutierrez, principal global security architect at Trustwave uncovers steps to take to maintain compliance with the new data protection and privacy laws, and help eliminate vulnerabilities in your environment.

  • 9 Best Practices for Active Directory Security

    Sponsored by: Quest

    This e-book explores how a typical insider threat unfolds, and details 9 critical security best practices that minimize the risk of the internal threat to your Microsoft Active Directory Systems.

  • Securing Azure Active Directory: Detection and Alert

    Sponsored by: Quest

    Once you've established the baseline for Azure AD security, the next step is to detect when and how changes are made. This white paper highlights four methods with which you can do this. Read on to gain guidance on detecting and alerting on changes to Azure AD groups, using sign-in risk detection, and more.

  • Building Effective Azure Active Directory Practices

    Sponsored by: Quest

    In this white paper, you'll examine a four-phase plan for developing effective Azure Active Directory security, focusing in particular on the first phase—continual assessment. Read on to learn how to perform continual assessments of role membership, security verification methods, groups, and more.

  • Protecting Users and Data with Cloud Security

    Sponsored by: Cisco Umbrella

    In this e-book, learn more about how your educational institution can build a holistic, multi-layer defense against ransomware attacks (especially in regards to protecting against email and Web-based threats).

  • GDPR: What Healthcare Organizations Everywhere Need To Know

    Sponsored by: Absolute

    Enforcement of the new EU GDPR rules is slated to begin in May 2018 and what they require should compel healthcare organizations to start preparing now. Inside, discover 10 recommendations to get started with GDPR compliance.

  • Security and Compliance Strategies for Success

    Sponsored by: Citrix

    Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.

  • A CISO's Guide to Mobile Threat Defense

    Sponsored by: Check Point Software Technologies Ltd.

    Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.

  • The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure

    Sponsored by: Google Cloud

    Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.

  • Cloud Secure Virtualization Datasheet

    Sponsored by: IBM

    Download this sheet to get the technical rundown on a cloud infrastructure that addresses in-house security needs with automated compliance controls and data security for virtualized cloud workloads. You'll learn how to establish virtual workload security down to the microchip level, and more.

  • Ready for the GDPR? Think Again

    Sponsored by: Veritas

    This report looks to highlight the vital areas where organizations are going wrong, and what steps they can take to get into compliance with the GDPR set to go into effect in May of 2018.

  • Is DNS Your Security Achilles Heel?

    Sponsored by: Akamai Technologies

    This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.

  • A 5 Minute Guide to Security for Cognitive Search and Knowledge Management

    Sponsored by: Attivio, Inc.

    Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • New Security Challenges Redefine Risk and Vulnerability

    Sponsored by: Fortinet, Inc.

    Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.

  • Toolkits, Apps, & Services Used Today to Launch DDoS Attacks

    Sponsored by: A10 Networks

    Find out how attackers launch different types of DDoS so that you can prepare your organization's security strategy to protect the key apps and data on its network.

  • Cybersecurity 101: The Fundamentals of Today's Threat Landscape

    Sponsored by: Kaspersky Lab

    In this e-book explore the growing trend of ransomware attacks and prevention tips for enhancing cybersecurity with automation techniques.

  • The Essential Checklist: A Practical Guide to Efficient Security Response

    Sponsored by: ServiceNow

    Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.

  • Ddos Jumpstart: 11 Best Practices for Mitigating the DDoS of Things

    Sponsored by: A10 Networks

    Learn how to proactively detect and mitigate even advanced, multi-vector DDoS attacks. Plus, find out how to protect your network and key business apps by implementing 11 best practices.

  • Cybersecurity — Whose Responsibility Is It?

    Sponsored by: Armor

    Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.

  • 4 Steps That Help You Protect Your Business

    Sponsored by: Ricoh - HarveyDavid

    As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.

  • GDPR Breach Notification Rule Could Complicate Compliance

    Sponsored by: Lepide Software

    Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.