ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ColorTokens

  • How Visibility Unlocks Zero-Disruption Microsegmentation

    Microsegmentation is gaining popularity amongst security architects for its ability to enhance agility, incident response, compliance readiness and more. Watch this webinar to learn more about the benefits and possibilities of microsegmentation from 2 distinguished experts.

  • Path to PCI-DSS 4.0: Simplifying Compliance and Securing Cardholder Data

    PCI-DSS v4.0 is expected to arrive in late 2020/early 2021 – and organizations are beginning to prepare. This webinar provides an overview of PCI-DSS 4.0, including the expected changes, what will (likely) remain unchanged, how zero-trust fits in, and more – watch now to get started.

  • Webroot Threat Report

    Each year, Webroot releases a threat report highlighting a look back at trending threats, successful security tactics, and more. Download this year’s report for a closer look into: malware, ransomware, phishing, high-risk URLs, malicious IP addresses, security awareness training & more.

  • Best Practices for Special-Purpose System Security

    A special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.

  • Microsegmentation: The First Step to Zero-Trust Security

    Modern security will see the elimination of adding network layer after network layer to fix security vulnerabilities. Businesses need a tighter security method, one that allows them to control traffic within and between segments. This is the basis of microsegmentation. Read this article to learn why microsegmentation is the way forward.

  • Approaches to Micro-Segmentation: Pros and Cons

    Micro-segmentation is emerging as one of the most effective methods in combating lateral threats that perimeter security fails to protect against. This article provides an overview of the 3 primary approaches to micro-segmentation, including the pros and cons of each approach – read on to get started.

  • How to Comply with PCI-DSS 4.0

    PCI-DSS 4.0 is expected to roll out mid-2021, and organizations are preparing their compliance strategies to reflect the expected adjustments. This article provides an overview of what will change in PCI-DSS 4.0, what will carry over, and how to pick a technology partner to help achieve compliance.

  • What is Micro-Segmentation?

    The cost of a data breach and the time it takes to find and isolate it are both inordinately high, underscoring the fact that the traditional castle-and-moat approach to cybersecurity is no longer relevant. Read on to learn why micro-segmentation is gaining traction as the best way to secure and govern all areas of your business’s data systems.

  • The Complete Guide to PCI-DSS 4.0

    PCI-DSS 4.0, the latest version of the Payment Card Industry Data Security Standard, is expected to be released in mid-2021. Although the full text of PCI-DSS 4.0 has yet to be released, there’s some information out there. In this overview, find out how PCI-DSS 4.0 will impact your business next year.

  • COVID and Cybersecurity: Threats, Trends, and Predictions

    View the webinar COVID and Cybersecurity: Threats, Trends, and Predictions for a deep dive into the latest research about the nature of today’s increasingly complex cyber threats – and how your organization can secure its critical assets.

  • Definitive Guide to Zero-Trust Security

    Upon first hearing the term zero-trust, it can feel a bit worrying to implement what sounds like a “never trust” security policy. But what it actually provides is “just enough trust” to authorized users while blocking out all other traffic. To learn more, dive into the Definitive Guide to Zero-Trust Security to understand how zero trust works.

  • Key Tenets of Zero Trust Architecture

    Zero-trust architecture (ZTA) is a security blueprint built on the premise that attackers are already present and that anything can be compromised at any point. Broadly speaking, the tenets of ZTA can be classified under three security domains. Read this short article alongside the NIST SP 800-207 to examine the vital roles of these tenets.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.