ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:BlackBerry

  • Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here

    If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.

  • Generations of Machine Learning in Cybersecurity

    Access this white paper to learn the 5 characteristics that define a generation of machine learning and analyze the 5 generations themselves to discover how to improve future machine learning cyber security initiatives.

  • The 5 Phases of Incident Response

    According to an IBM study, the “vast majority” of organizations today are unprepared to respond effectively to a serious security incident. Most often, this is due to chronic resource issues and inadequate planning. Get in the know – read this white paper to learn the 5 phases of incident response and how to implement them.

  • Singapore Nonprofit PPIS Secures Centers with Help from BlackBerry and Partner ACE Pacific Group

    With the world having changed the way it does business, security professionals have had to place a lot of emphasis on endpoint security and, more specifically, threat detection and response. Want to learn more? View this impressive case study to learn how a nonprofit in Singapore was able to prepare for the unexpected.

  • Decade of the Rats

    The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report and learn also the different types of remote access trojans (RATs) and what they look like.

  • Ransomware Prevention and Remediation

    According to a recent study, 62% of organizations were victimized by ransomware – 58% of which opted to pay the ransom. As this threat vector becomes more lucrative for cybercriminals, expect these numbers to go up. So, what can be done about ransomware? Read this solution brief for BlackBerry’s answer.

  • The New Reality

    Although issues related to protecting and managing endpoints existed long before COVID-19, the recent pandemic put a spotlight on these issues. In order to address these challenges, organizations are opting for unified endpoint security solutions – read on for an in-depth look at what that entails and why it’s gaining popularity.

  • Don’t Compromise on Security in a Crisis

    As organizations encourage their employees to work from home as a measure of personal health and safety, criminals are looking to take advantage of the transition period as an entry point for their cyberthreats. In this white paper, discover how to achieve effective remote worker security that doesn’t sacrifice efficacy.

  • AI-Driven EDR

    Endpoint detection & response (EDR) is a rapidly evolving technology that continues to outsmart threats outside the network and respond to those within it. Now, the power of artificial intelligence is granting EDR even more capability while lowering cost. Jump into this e-book to get a closer look at AI-driven endpoint detection & response.

  • 5 Essentials for Returning to Work

    If businesses are to return to work in a diligent and organized manner, they must consider their communications strategies in order to maintain operations. Staying in touch with stakeholders is a key to success for any organization, and by reading this informative white paper, you can learn 5 steps to ensure this won’t be an issue.

  • Remote Work Is the Future

    Remote work is quickly becoming a new reality for the foreseeable future. In this case study, discover what led ConvergeOne, a professional and managed services provider in North America, to partner with BlackBerry and explore the outcomes of their remote work project.

  • Unified Endpoint Management (UEM)

    Today’s endpoints are widely distributed, unique and, most of all, vulnerable. The evolution of the endpoint requires an evolution in endpoint management to match, and that’s where Unified Endpoint Management (UEM) comes in. Dive into this e-book and learn 5 reasons why you should take a closer look at UEM, as well as its ties to zero trust.

  • 7 Strategies to Securely Enable Remote Workers

    Remote work is becoming a “must-have” job requirement, and security architectures and network protocols are changing as a result. New security methodologies, like zero trust, are being more heavily considered, and network professionals must work to ensure productivity from anywhere. Read this white paper to learn 7 strategies for remote enablement.

  • Choosing the Best Mobility Management Solution

    Third-party unified endpoint management (UEM) tools are emerging as one of the most cost-effective and secure ways to gain visibility into and protect all endpoints within an organization’s network. This VDC Research report provides a comparative analysis of BlackBerry’s UEM offering vs. Microsoft’s UEM – read on for the results.

  • BlackBerry AtHoc: Return to Work Safely

    This white paper provides an in-depth look at BlackBerry AtHoc, a crisis incident communications platform designed to help organizations communicate, collaborate and react decisively to any incident, event or emergency situation.

  • Best Practices in Crisis Management

    The ability to reach out to your staff and essential stakeholders during an impending incident or crisis can help to minimize further business impacts and disruptions. Download this white paper to learn more about the importance of communications in crisis management.

  • Futureproofing IoT

    The number of devices connected to the internet of things (IoT) is set to more than double in the next five years. While a surge in data promises gains in efficiency and productivity, experts warn of the growing threat from state-sponsored hackers. In this report, explore the steps businesses must take to ensure their IoT is properly secured.

  • Mobile Malware and APT Espionage

    Mobile threats have been around nearly as long as the mobile phone, but these attacks continue to increase in volume and complexity – they even go so far as to be a primary target for state-sponsored espionage attacks. Read this research report for key insight and new intelligence regarding mobile malware and government espionage.

  • BlackBerry Helps ONGC Systems Achieve Significant Endpoint Security ROI

    For ONGC Systems, who oversees IT management and security for more than 64,000 SMBs in Queensland, Australia, finding an endpoint security tool that would meet the security, visibility and budgetary needs was a daunting task. Read this case study to discover how ONGC partnered with BlackBerry to meet ROI needs.

  • InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks

    Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.

  • Endpoint Security for Smart Manufacturing: Protection from the Factory Floor To the Supply Chain

    Manufacturers have embraced digital transformation, which means they’re now capturing more and more data on many new and different types of endpoints, both in their factories and throughout their logistics channels. But with all that data comes added security risks. Jump into this white paper to look at these threats and their implications.

  • How to Secure Your Remote Workforce Effectively

    Remote working capabilities enable organizations to support a global workforce – and if done effectively it can yield benefits related to efficiency, flexibility and cost-effectiveness without sacrificing security. Read this eBook to learn how to secure remote workforces.

  • State of Ransomware

    The increased reporting of cyber incidents among large companies in ANZ in the first half of 2020 has been evident. A handful of ransomware families are dominating these attacks. Browse this report to investigate some of the tactics used by these ransomware families, their high profile victims, and strategies used to defend against these threats.

  • BlackBerry MITRE ATTACK APT29 Evaluation

    In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.

  • Reece Group Protects Endpoints and Automates Threat Management

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.