ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies White Papers

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • Is DNS Your Security Achilles Heel?

    Sponsored by: Akamai Technologies

    This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.

  • GDPR Breach Notification Rule Could Complicate Compliance

    Sponsored by: Lepide Software

    Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.

  • How You can Secure the Use of Cloud Apps and Services

    Sponsored by: Symantec

    Read inside about an industry-leading Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization

  • A 5 Minute Guide to Security for Cognitive Search and Knowledge Management

    Sponsored by: Attivio, Inc.

    Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • New Security Challenges Redefine Risk and Vulnerability

    Sponsored by: Fortinet, Inc.

    Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.

  • Toolkits, Apps, & Services Used Today to Launch DDoS Attacks

    Sponsored by: A10 Networks

    Find out how attackers launch different types of DDoS so that you can prepare your organization's security strategy to protect the key apps and data on its network.

  • Cybersecurity 101: The Fundamentals of Today's Threat Landscape

    Sponsored by: Kaspersky Lab

    In this e-book explore the growing trend of ransomware attacks and prevention tips for enhancing cybersecurity with automation techniques.

  • Evolution of the Online Battlefield

    Sponsored by: Armor

    From botnets to APTs and DDoS attacks, learn more about the history of cyberattacks and how they've shaped the current threat landscape.

  • The Complexities of the Secure DIY Cloud

    Sponsored by: Armor

    Private and DIY clouds present critical implementation and management challenges when it comes to security and compliance. Learn how to simplify cloud security by anticipating the complexities of cloud migration and adoption.

  • Reducing Attacker Dwell Time

    Sponsored by: Infocyte

    Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.

  • The Essential Checklist: A Practical Guide to Efficient Security Response

    Sponsored by: ServiceNow

    Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.

  • Ddos Jumpstart: 11 Best Practices for Mitigating the DDoS of Things

    Sponsored by: A10 Networks

    Learn how to proactively detect and mitigate even advanced, multi-vector DDoS attacks. Plus, find out how to protect your network and key business apps by implementing 11 best practices.

  • How to Enhance AWS Security

    Sponsored by: Splunk

    Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.

  • Cybersecurity — Whose Responsibility Is It?

    Sponsored by: Armor

    Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.

  • How Should Companies Across the Globe Prepare for EU GDPR Compliance?

    Sponsored by: Commvault

    As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance

  • Making Cloud Work for Business

    Sponsored by: NTT Communications Corporation

    Download this resource to learn how in just 5 short steps, you can take ahold of your cloud initiative, and overcome the biggest barrier to adoption—security.

  • Build Your Identity and Access Management Strategy

    Sponsored by: RSA

    This Forrester Research report provides guidance for the development of a compelling and successful identity and access management strategic plan.

  • Protecting Data in the Healthcare Industry

    Sponsored by: Mimecast

    The large amount of personal information held by healthcare providers and hospitals make them ideal targets for cyberattack (especially from rogue employees). Read on to learn the history of compliance regulations, how current IT trends have increased risks (such as data theft), and what can be done to prevent data theft, fraud and more.

  • 2017 Global Security Report

    Sponsored by: Trustwave

    The reactive information security paradigm of 10 years ago can no longer defend against the virtual and connected threats of today. In this global cyber security report, read about the current state of IT security and how it fares against evolving threats from hackers and cybercriminals.

  • Enterprise Defense at the Speed of Data

    Sponsored by: ThreatConnect

    Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.

  • Cost of Cyber Crime Study

    Sponsored by: Hewlett Packard Enterprise

    In this Ponemon Institute report, learn why companies with high security profiles experience an average cost of cybercrime that is much lower than those with low profiles.

  • Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network

    Sponsored by: nCircle

    This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.