ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Nexum

  • A Tale of Two Conventions: Black Hat and DEF CON 30

    This article presents an account of both conventions, analyzing how each showcased innovations within the security market in a completely different style and format. The article then goes on to provide insight into which conference you should attend depending on what secuirty topics you are interested in. Continue reading to learn more.

  • Documentation from Visibility

    As organizations continue to deploy systems and software of an ever-increasing sophistication, the more difficult it becomes for security teams to maintain visibility.In this 4th installment of Nexum’s Visibility Series, they discuss the importance of documentation and visibility in operational cybersecurity. Continue reading to learn more.

  • Acronym Series Introduction

    Cybersecurity is filled with acronyms and terms that can be difficult to fully understand, which can lead to confusion and intimidation for potential interested parties. In this blog post, Nexum introduce their Acronym Series, which aims to spread cybersecurity awareness by providing explanations of various acronyms. Read now to learn more.

  • Cloud Networking: From Magic Smoke to Black Boxes

    Cloud networking was once hailed as the savior of the entire tech community. While DevOps has embraced it, security and networking continue to find challenges with managing and scaling. This blog post looks at cloud networking, analyzing how it operates differently to traditional networking. Continue reading to learn more.

  • ZTNA: Zero Trust Network Access

    ZTNA is one of the hottest acronyms in the cybersecurity space. While many people know what it stands for, different interpretations focus on different things.Go onto the landing page now to learn about ZTNA, through a succinct definition, as well as an in-depth explanation going into its origin and significance.

  • EDR: Endpoint Detection Response

    You’ve probably heard of EDR, but with so many acronyms in the security space, you may not know what it stands for or what it really means.Access this exclusive landing page to explore expert opinions and explanations of EDR’s origin and modern importance.

  • SSL: Secure Sockets Layer Acronym Series

    You may have heard of "SSL: Secure Sockets Layer" but there hasn't been a consistent definition/assessment of the scope of the term...until now.Go onto the landing page now to learn about SSL, through a succinct definition, as well as an in-depth explanation going into its origin and significance.

  • CISO Guide to Ransomware

    Unless Ransomware is stopped before reaching end users, it will continue to cause severe financial losses and reputational damage—and continue to pad the pockets of cybercriminals. Open this guide to explore the ins and outs of ransomware and how to prevent it.

  • Prevent Ransomware with SASE Ransomware Series Part 2

    In part 2 of Nexum’s ransomware series, Principal Engineer George Grzyb will continue where he left off in part 1, expanding on the basic threats and ideas behind ransomware and moving onto the technology that is crucial towards prevention and defense. Read the full blog to learn more about SASE and its role in preventing ransomware.

  • Palo Alto Networks BPA+ Review Partner Update

    What has your firewall done for you lately? According to Gartner, through 2023, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.I know what you’re thinking. Access this blog to learn how Palo Alto Networks has already made things easy for you with their Best Practice Assessment Plus (BPA+).

  • Attack Observations Since the Russian Invasion of Ukraine

    Due to ongoing geopolitical events, zero-day exploits have become more of a concern for organizations around the globe. Tap into this blog article to learn 10 tips for reducing risk to your organization.

  • The Issue With Open-Source Code Utilization

    Due to ongoing geopolitical events, some individuals have begun to “poison” major open-source projects to try to cause damage. Access this blog article to learn complications with open-source code utilization.

  • Network Alerting Visibility Series Part 3

    One of the primary things Information Technology (IT) and security teams continue to contend with are alerts. In this blog article, learn why the lines between SIEM and SOAR have blurred, the role SIEM plays in response at scale and more.

  • Cloud Security Frameworks and 10 IAM Tools for Network Security

    Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.

  • Flashlight on ShadowIT

    Shadow IT refers to the systems or applications that are used without the knowledge, or consent, of an organization’s IT department – leading to exposed sensitive information. Instead of implementing brand new tools, you can best leverage your existing tools. Read on to learn how to bring these tools together.

  • Endpoint Security E-guide

    Read this e-guide to fully understand the importance of endpoint security, how it works and 6 crucial components to look for in an endpoint security platform.

  • Ransomware Disruption Overview: Ransomware Series Part 1

    You’ve heard about ransomware quite a bit in the news lately, but why is this the case? In this blog post, get an in-depth look at how ransomware works, why the risk of ransomware is higher than ever before and security methods for ransomware prevention, such as a cloud access security broker (CASB), DNS security and more.

  • Tackling the Visibility Monolith: Visibility Series Part 1

    Visibility in its purest form is when different teams have different views into how their systems communicate across the entire enterprise. Nexum aims to help customers reexamine how they are approaching visibility. Read on to learn more.

  • The Complete Pocket E-Guide to Cloud Security

    As today’s organizations come to rely on cloud applications, capabilities and environments in order to conduct their business, cloud security has become a necessity. Read this e-guide to learn about today’s cloud security challenges and how to develop your own cloud security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.