ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:HelpSystems

  • Preventing unwanted sensitive data acquisition on the corporate network

    Insider threats are quickly becoming one of the most prominent risk areas for an organization. In fact, the average cost of an insider threat for organizations in 2020 was estimated at $2.79 million. But where are these insider threats coming from and how can an organization be equipped to handle them? Read this e-guide to find out.

  • Controlling Classified Information

    For Australian Government organizations required to comply ASD and ISM, Clearswift aims to address several controls around email, data protection and enforcement of the PSPF. Clearswift’s Secure Email Gateway and Secure ICAP Gateway work together with classification tools. Read on to learn more.

  • Transferring Confidential Information: Best Practices for Safe Data Sharing

    In this guide, find best practices for securing and protecting confidential information, use cases that highlight how easy it is for sensitive and confidential information to be compromised when it is transferred, and how a data security solution can help.

  • Anatomy of a Compromised Account

    ACID seeded 8,000+ phishing sites with fake credentials to monitor bad actors, and found that 50% of compromised accounts were accessed within 12 hours. Through ACID’s analysis, they gained insights into what cybercriminals do with stolen the credentials. Learn how they answer important questions about the attack lifecycle.

  • Managing Cybersecurity Risk in the Supply Chain

    A BlueVoyant study into global supply chains found that 80% of organizations surveyed experienced a cybersecurity breach that originated from vulnerabilities in their supplier ecosystem. What can organizations do to protect their ecosystem? Learn about 5 cyber resilience best practices in the whitepaper.

  • Transferring Confidential Information: Best Practices for Safe Data Sharing

    In this guide, find best practices for securing and protecting confidential information, use cases that highlight how easy it is for sensitive and confidential information to be compromised when it is transferred, and how a data security solution can help.

  • Mitigating Information Security Risks in Microsoft 365

    With the dramatic increase of employees working from home, many businesses initiated rapid Microsoft 365 deployment. How do you ensure that anti-virus and anti-spam capabilities don’t fall short? Learn how Clearswift alongside Microsoft 365 technologies aims to close security gaps & mitigate risk for your business.

  • Anatomy of a Compromised Account

    ACID seeded 8,000+ phishing sites with fake credentials to monitor bad actors, and found that 50% of compromised accounts were accessed within 12 hours. Through ACID’s analysis, they gained insights into what cybercriminals do with stolen the credentials. Learn how they answer important questions about the attack lifecycle.

  • Controlling Classified Information

    For Australian Government organizations required to comply ASD and ISM, Clearswift aims to address several controls around email, data protection and enforcement of the PSPF. Clearswift’s Secure Email Gateway and Secure ICAP Gateway work together with classification tools. Read on to learn more.

  • What Is Data Classification And What Can It Do For My Business?

    Explore this white paper for an overview of data classification including the benefits of each kind of classification and a road map to prepare for a data classification project.

  • The 5 Steps To Effective Data Protection

    Check out this white paper to learn the 5 steps to implementing effective data classification to improve protection within your organization and discover how data classification can enhance previously implemented tools like data loss prevention and disaster recovery.

  • Data Classification: The First Step To Protecting Unstructured Data

    Check out this white paper that discusses how the threat landscape for businesses is changing, the drivers behind the change, and the challenges involved in managing, controlling, and protecting data.

  • Classification By Design: The Foundation Of Effective Data Protection Compliance

    Explore this white paper to learn key steps to help your organization sensibly adopt a better data protection posture and with it, build a firm foundation towards onward compliance.

  • Mitigating Information Security Risks in Microsoft 365

    Microsoft 365 has become one of the most consistently used productivity tools across nearly every organization – making it a natural target for cyberattacks. Read this e-guide to learn about today’s top threats and what you can do to detect and mitigate them.

  • Managing Cybersecurity Risk in the Supply Chain

    Supply chains have become a prime target for cybercriminals – which is illustrated by the rise in third-party vulnerabilities and breaches across 2020. Read this e-guide to discover the emerging supply chain threats, their implications for each industry, and 5 ways organizations can better protect themselves.

  • Preventing unwanted sensitive data acquisition on the corporate network

    Insider threats are quickly becoming one of the most prominent risk areas for an organization. In fact, the average cost of an insider threat for organizations in 2020 was estimated at $2.79 million. But where are these insider threats coming from and how can an organization be equipped to handle them? Read this e-guide to find out.

  • Improve Your Privacy Strategy

    Data privacy is critical to get right – but in the era of cloud, standalone data privacy tools, like Microsoft Azure Information Protection, may not be enough. Read this white paper to learn about some of the common pitfalls of Azure and how your organization can extend Azure’s data security capabilities to enhance your privacy strategy.

  • Smarter Data Protection with Machine Learning

    As data grows in its volume and value, organizations should ensure their data privacy capabilities are poised to address today’s cyberthreats and compliance requirements. Read this white paper and discover how machine learning and artificial intelligence can enhance data security programs.

  • Enhancing security automation

    As the volume of data grows, improving data security efforts becomes increasingly critical as well as more difficult. This brochure provides a closer look at how Titus is incorporating automation and artificial intelligence (AI) into data security efforts in order to manage increasing pressures.

  • NIST SP 800-171 and CUI

    Both the CUI and NIST SP 800-171 programs are designed to standardize how government agencies (federal or nonfederal) manage and protect unclassified information – but ensuring compliance can be tricky. Read this solution brief to see how Titus is helping contractors comply with each of these requirements.

  • Can you handle your data?

    As data security regulations grow stricter and cyberthreats become more complex, organizations need better information handling and data governance policies — which includes the right tools to help them implement their policies. Read this white paper to learn more about data handling in the era of privacy and compliance.

  • Seamless transition to CUI markings

    The Controlled Unclassified Information (CUI) program was implemented to standardize how government agencies safeguard unclassified information – however the program can be complex and time-consuming. Read this solution brief to learn about how Titus is helping agencies reduce the time and stress of a CUI program.

  • Creating a Culture of Security

    You can invest in all the security tools you want, you can provision every security tool correctly and you can eliminate as much risk as possible – but if your organization is not creating a culture of security, you’re nowhere. Enter this white paper and extract 4 steps to cultivating security awareness among your network’s users.

  • Data protection for remote workers

    The large-scale move to a remote workforce has put an emphasis on IT’s need to scale security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise. What can you do to ensure data security? Examine this solution brief to learn how to fill in the gaps for protecting data.

  • The Vital Role of Security in Digital Transformation

    Right now, every business is being pushed to transform by one or more of these 3 key drivers: consumer demand, technology and competition. But security can cast a long shadow over digital transformation – so how do you move forward? In this white paper, learn where security may be headed.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences