ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:SearchSecurity.com

  • Say Hello, Again, to SIEM

    This expert handbook provides 3 tips to get the most out of your existing SIEM system. Plus, uncover important SIEM capabilities when evaluating SIEM for real-time analytics use.

  • Time for an IAM Overhaul

    IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.

  • Buff Up Your Web Apps

    Secure web apps are essential to modern business. Learn what security risks they present and get our experts' advice on how to overcome them.

  • Securing DevOps

    In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.

  • Time to Toughen Up for IoT

    The list of internet of things challenges is not short, but security is still a top concern. Learn to cut risks and follow IoT security best practices.

  • Is UTM Ready for the Big Leagues?

    This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.

  • Is UTM Ready for the Big Leagues?

    This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.

  • Information Security Asean July 2016

    In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

  • Information Security ANZ July 2016

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • Malware Hitching a Ride on Mobile Apps?

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • What to Look for in Next-Generation Firewalls

    This Buyer's Guide goes in-depth on the process of selecting the best next-generation firewall for your company and how to ensure your organization has a clear understanding of its security requirements in the modern threat landscape.

  • Moving Beyond Ad Hoc Mobile Security

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Moving Past the Password? Not So Fast

    The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.

  • Information Security Magazine: Insider Edition

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.

  • What to Look for in Secure Sockets Layer

    This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.

  • Is It Time to 'Software-Define' Your Network Security?

    This guide goes beyond most examinations of security in SDN, goes beyond explaining what SDN is and how it might improve network security. Instead, this publication looks in-depth at specific implementations of SDN. Readers will come away with a freshly packed toolkit of SDN-related actionable advice.

  • Cloud Security Gateways Rise to the Data Loss Challenge

    This issue of Information Security magazine uncovers cloud data loss prevention (DLP) strategies and whether CASBs can offer another layer of protection. Additionally, learn about the Cybersecurity National Action Plan and the readers' top picks for endpoint protection software.

  • What to Look for in Multifactor Authentication Tools

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • What to Look for in Endpoint Antimalware Tools

    Read this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.

  • SOC Analyst in a Box

    Discover endpoint detection and response (EDR) tools and incident response procedures that will help shorten the time between threat detection and response.

  • Monitoring that Cloudy Network

    Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud. In this guide, learn how to adapt and advance your security monitoring efforts.

  • Under Attack? 2016 Defenses Escape Compromise

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • Threat Monitoring in Tough Times

    Today's threat environment can be murky, and advanced security monitoring is essential. Access this three-part guide and learn the latest means for rooting out the fast-moving malicious actors that are targeting your enterprise's systems.

  • Resolve to Revitalize Your SIEM Security

    This expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.