ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • How Overreliance on EDR is Failing Healthcare Providers

    Sponsored by: CyberArk

    Healthcare organizations must stop relying solely on EDR and shift to a more comprehensive cybersecurity strategy—one that includes strong identity security, access controls, and continuous threat monitoring. With the stakes higher than ever, it’s time to take a more proactive, multi-layered approach to safeguard not just patient data, but lives.

  • Machine Identity Security Architecture

    Sponsored by: CyberArk

    Read this white paper to learn why organizations should consider migrating to a modern machine identity security architecture – and discover the revolutionary Control Plane blueprint that secures organizations at scale without slowing the speed of development.

  • Guiding Your Leadership Team Through the Zero Trust Mindset

    Sponsored by: CyberArk

    Zero trust identifies users and entities and grants them just the right amount of access as needed. In this e-book, LATAM Field Technology Director at CyberArk, Cláudio Neiva, leverages his 24 years of experience to break down the essential elements of zero trust. Read on to learn more.

  • The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat

    Sponsored by: Contrast Security

    Financial services face rising cyber threats like island hopping and exploited vulnerabilities. Learn how to safeguard applications with insights from Contrast Security and AWS experts in this informative video.

  • AWS-Splunk Video

    Sponsored by: AWS-Splunk

    Unfortunately, almost a third of IT and security managers can’t keep their security data online due to cost or operational shortcomings. Join Amazon Security Lake GM Mark Terenzoni and Splunk Product Management Director Colin Gibbens as they discuss how their two organizations partner to create an accessible, modern security strategy.

  • T-Mobile for Business Webinar

    Sponsored by: T-Mobile for Business

    In this brief video, learn why small and medium businesses are recognizing reliable connectivity as foundational to business success today – and discover how you can conquer connectivity challenges with 5G and wireless broadband technology.

  • Critical Condition How Qilin Ransomware Endangers Healthcare

    Sponsored by: CyberArk

    In this eye-opening presentation, experts raise the alert of Qilin, a sophisticated Ransomware as a Service operator specifically targeting the U.S. healthcare sector. Discover how threat actors evade EDR detection, exploit MFA vulnerabilities, and execute devastating attacks on medical institutions.

  • Network Threat Trends Research Report

    Sponsored by: Palo Alto Networks

    Understanding threat actors’ preferred methods and malware families can give you insights into how to set up your defenses and best protect your organization. In this report, explore current trends in malware and the evolving threat landscape with exhaustive research from the Palo Alto Networks Unit 42 research team.

  • NCC Group Video

    Sponsored by: NCC Group

    Software reaching end-of-support feels like a ticking time bomb: inevitably, vulnerabilities will be discovered, and threat actors will strike. And with heavy reliance on software, whether on-premises or on cloud, many organizations require an additional measure of protection. Discover the value of software escrow with Escode in this video.

  • How Agentforce drives employee productivity at Salesforce

    Sponsored by: Salesforce and Deloitte Digital

    During this webcast, you’ll discover why Salesforce partnered with Deloitte Digital to deploy Agentforce Service Agent on Employee Success’ Service Cloud platform for HR case management. Tune in now to find out how you can transform the employee service experience and enable productivity and capacity gains for both agents and employees.

  • The Role of GenAI in ELevating Contact Center as a Service

    Sponsored by: Salesforce and Deloitte Digital

    During this webcast, you’ll find out how you can leverage GenAI strategies to take your contact center operations to the next level. Tune in now to learn how you can assess your contact center’s AI readiness and chart a course for more efficient service delivery.

  • Organizations Largely Unprepared for the Advent of 90-Day TLS Certificates

    Sponsored by: CyberArk

    CyberArk surveyed 800 security leaders to gauge their readiness for a 90-day TLS certificate standard, and uncovered their greatest management challenges and concerns about how this bold browser move could break businesses. Continue on to unlock the 20-page report.

  • 5 Steps to Prepare for 90-Day TLS/SSL Certificates

    Sponsored by: CyberArk

    Google’s anticipated shift to 90-day TLS certificates will require 6x as many certificate renewals than 1-year certificates currently do. That means automated certificate lifecycle management is the way forward, because manual approaches simply cannot keep up. Read this eBook to explore how you can prepare.

  • The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024

    Sponsored by: Palo Alto Networks

    From preparation to disaster recovery and everything in between, it can be overwhelming for security teams to cover all their bases. This report from Forrester provides insights on how the top 14 incident response services providers stack up as we turn to the new year. Download the full report to learn more.

  • Top 5 To Do's to Create Complete Security for Your Cloud Environment

    Sponsored by: Utimaco

    Despite the myriad benefits it offers, the cloud comes with immense risk. In fact, bad actors see your cloud environment as an opportunity. This webinar counts down 5 essential points for achieving comprehensive security across your entire cloud environment.

  • Securing Privileged Access in Transformative Times

    Sponsored by: CyberArk

    In this piece on PAM’s evolution, you’ll find stories, insights and best practices from Barak Feldman, Senior Vice President, Privileged Access Management and Identity Security, CyberArk. Download it today, and learn how to secure high-risk access in two fast-emerging PAM use cases: Cloud environments and Operational technology (OT).

  • Clinical Evaluation: An AI Assistant for Primary Care

    Sponsored by: Navina

    AAFP study reveals Navina's AI cuts chart review by 30%, reduces burnout by 23%, and improves outcomes. Learn how AI is transforming family medicine.

  • Thriving in tomorrow's healthcare: a roadmap for value-based success in 2025

    Sponsored by: Navina

    Watch Navina and AMGA’s webinar for a roadmap to value-based care success in 2025. Discover strategies, technologies, and best practices to improve outcomes and reduce burnout.

  • Discover 3 ways to elevate the customer experience and still reduce costs

    Sponsored by: ServiceNow

    Read this ebook to see how you can proactively address customer issues, reduce inbound calls, and give employees better customer insights, while driving down cost to serve — using ServiceNow's AI-driven platform.

  • PQC from Theory to Practice

    Sponsored by: Utimaco

    Emerging quantum threats to classic cryptography are introducing significant business risk and setting the stage for potentially dire consequences. This webcast examines the importance of post quantum cryptography in mitigating the quantum threat.

  • Enhancing Visibility of HSM Keys across the Digital Ecosystem

    Sponsored by: Utimaco

    Utimaco, a leading provider of Hardware Security Modules (HSMs), has partnered with Infosec Global in order to enhance the visibility of HSM keys across the digital ecosystem. This webinar provides insights into this strategic partnership and the value it offers for your business.

  • Transforming Security: Innovative Cyber Solutions for Digital Transformation in 2024

    Sponsored by: Utimaco

    This webinar examines the evolving digital landscape and the critical role played by cybersecurity. Inside, learn about key technologies driving digital change, common digital transformation hurdles, practical steps to digitize business processes securely, and more.

  • Discover General Purpose Hardware Security Modules as a Service

    Sponsored by: Utimaco

    This webinar examines general purpose hardware security modules as a service, and provides key insights for ensuring success when adopting a data protection as a service strategy.

  • Fortifying Against Quantum Threats - Proven Defense Mechanisms

    Sponsored by: Utimaco

    Quantum computers have the potential to significantly enhance efficiency and problem-solving capabilities; however, in the wrong hands, they also pose a substantial threat to the security of present-day cryptography. This webinar shines a light on the world of quantum threats and offers proven defense mechanisms.

  • 12 tips to immediately improve customer satisfaction

    Sponsored by: Boost.ai

    In this blog post, you’ll learn how you can build a culture that puts the customer first across every business unit. Although the path may seem daunting, the benefits of happy, loyal customers are well worth your time and effort. Read on now to discover actionable tips you can use for immediate improvements in your customer experience strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.