ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:SearchSecurity.com

  • Finding a Secure Managed File Transfer Tool: Key considerations

    Read this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.

  • The Best Email Security Comes Through Strategy and Tactics

    Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.

  • How to Implement a Strong COVID-19 Cybersecurity Plan

    Cybercriminals aren't slowing down during the pandemic, and neither can your security. Learn about the biggest threats right now and how to stop them cold.

  • Employ AI for Cybersecurity, Reap Strong Defenses Faster

    Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.

  • Security Access Controls Over Identities Must Be Priority

    No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.

  • What secure email gateways can do for your enterprise

    It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.

  • How to Keep Each Cloud Workload Accessible and Secure

    While the shared responsibility model of cloud security is still relevant, responsibility for keeping cloud workloads safe is increasingly falling more on the shoulders of the in-house security team and management. Download this handbook for everything you need to know about keeping your cloud workloads accessible and secure.

  • A Guide to SIEM Platforms, Benefits and Features

    SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.

  • Assess Secure Web Gateways to Suit Your Network Security Needs

    Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.

  • Why EDR Technologies are Essential for Endpoint Protection

    While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.

  • Who Needs Security Orchestration, Automation and Response?

    Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to boost the security of an organization's systems and data.

  • Secure DevOps Brings Better, Faster, Safer Software

    In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.

  • Who needs security orchestration, automation and response?

    Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.

  • Incident response playbook in flux as services, tools arrive

    The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.

  • Explore the Threat Hunting Process

    The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.

  • Allure of the threat hunter draws companies large and small

    Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.

  • User behavior analytics tackles cloud, hybrid environments

    In this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.

  • How to Best Secure DNS? There's More Than One Approach

    Few aspects of the internet are as crucial as the domain name system. A DNS failure could bring the internet to a halt. What approach are you taking to protect and secure DNS in your organization? Download this handbook for insights into effective DNS security approaches.

  • Recent Ransomware Attacks Got you? Don't Cry; Fight Back!

    Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.

  • Security data scientists on how to make your data useful

    In this issue of Information Security magazine, CISOs and security data scientists offer strategies for effective use of data analytics and machine learning to advance enterprise threat research.

  • Get Smart About Threat Intel Tools and Services

    Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.

  • How to Make a SIEM System Comparison Before you Buy

    Considering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.

  • CISOs face the IoT security risks of stranger things

    Strategies to manage IoT security risks remain in the early stages outside of healthcare and a few other industries. It's not just data that can be stolen or your PC crippled; now your HVAC unit and your robotic manufacturing process or your company truck are targets, too.

  • CISOs Map Out Their 2018 Cybersecurity Plans

    As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.