ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • How Does Security Innovation Power Digital Transformation?

    Sponsored by: ZeroNorth

    Digital transformation defined by its seeming-endless search for technological innovation. Unfortunately, security can sometimes be an afterthought for companies looking to stay ahead of the competition. In this white paper, discover how security innovation can augment digital transformation.

  • How to Become Cyber Resilient: A Digital Enterprise Guide

    Sponsored by: Malwarebytes

    Tap into this white paper to explore the current market influences that impact how an organization pursues cyber resilience, the key methods that should be adopted in becoming cyber resilient, and the reasons why cyber resilience can transform an organization into a digital enterprise highly focused on growth.

  • The New Norm: Trend Micro Security Predictions for 2020

    Sponsored by: Trend Micro

    Industry experts at Trend Micro recently conducted research into past cybersecurity trends to develop their predictions for ever-evolving landscape of cybersecurity threats and defense methods in 2020 and beyond. Continue to read the full report.

  • IDC Worldwide Cloud Security Market Shares, 2018: Protecting Workloads in Hybrid and Multicloud

    Sponsored by: Trend Micro

    SDC workload security spans threat protection, vulnerability management, analytics, and data integrity to protect what runs on top of the SDC infrastructure. This research report offers advice for technology suppliers and highlights the global market share. Read on to uncover the results.

  • Webinar: You Need Live Patching to Achieve SOC2 Compliance

    Sponsored by: CloudLinux

    In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.

  • A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems

    Sponsored by: ShieldX

    Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.

  • Magecart Attack on Focus Camera

    Sponsored by: Tala Security

    Magecart attacks continue to plague websites and sensitive customer data. In this solution brief, learn how Tala Security protects against client-side attacks by exploring the features and capabilities the enable them to provide website security.

  • Zero Trust Access Helps UK County Improve Productivity and Access Control

    Sponsored by: PortSys

    The initiation of GDPR caused widespread change in the way organizations handled consumer data across the EU. In this case study, follow the Essex County Council, keepers of personal data for their residents, through their post-GDPR journey towards zero-trust access control to enable their employees to collaborate in a secure environment.

  • Spear-phishing Analysis with ThreatQ Investigations

    Sponsored by: ThreatQuotient

    Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. This webinar provides an analysis of how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.

  • A CISO’s Guide to Micro-Segmentation

    Sponsored by: ShieldX

    Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. The following guide includes a comprehensive checklist designed to take the pain out of micro-segmentation adoption.

  • Security Controls for Effective Micro-Segmentation

    Sponsored by: ShieldX

    With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.

  • Implementing Effective Cyberprotection Demands New Approaches

    Sponsored by: NWN Corporation

    As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen partner provides should include.

  • ESG XDR Paper: Beyond EDR

    Sponsored by: Trend Micro

    76% of companies feel that threat detection and response is more difficult today than it was 2 years ago. SIEM approaches are becoming too costly, and EDR tools aren’t a standalone option. So, what options, if any, do organizations have? Read on to learn more.

  • Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way

    Sponsored by: Malwarebytes

    In this short story, following the journey of Olivia and Luciana as they face the cybersecurity threats associated with remote workers, VPNs and cloud platforms to establish the necessary technologies and employee enablement to overcome these challenges and reshape their security strategy.

  • Board Ready Endpoint Resilience in 5 Steps

    Sponsored by: Malwarebytes

    The increasing popularity in mobile workspaces and BYOD devices has transformed the way CISOs have to think about security. With cyberattacks on the rise, implementing endpoint resilience is has become critical. In this e-book, uncover the 5 essential steps to establishing endpoint security and the recommendations for achieving each step.

  • How to Build a Winning Cybersecurity Team

    Sponsored by: Global Knowledge

    Just like a sports team, cybersecurity teams need to be carefully built and managed in order to reach peak performance. Effective cybersecurity teams also require adequate processes and technologies to support their efforts. So, what should you consider when building a winning cybersecurity team? Read on to find out.

  • Interview with Identity Expert

    Sponsored by: Mitek Systems, Inc.

    In this Q and A, the head of risk and payments at an American money transfer company sits down with the customer success leader at Mitek to talk about role of identity verification in innovation and how increasing regulations will affect financial institutions. Read on to learn more.

  • Making MITRE ATT&CK Actionable

    Sponsored by: ThreatQuotient

    In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.

  • Mobile Verify

    Sponsored by: Mitek Systems, Inc.

    Through advanced machine-learning algorithms, identity verification enables businesses to authenticate their digital users’, empowering them to enhance customer experience and data security. Read this data sheet to explore the science behind Mitek’s Mobile Verify digital identity verification tool and how it works.

  • Why automation is essential for cyber resilience

    Sponsored by: Malwarebytes

    While digital transformation equips organizations to be more productive, it also exposes networks to potential threats. This data sheet outlines key insights into the current cybersecurity landscape and highlights why organizations should consider including automation into their strategy.

  • The 5 Most Dangerous New Attack Techniques: Are They Evolving?

    Sponsored by: RSA Conference

    Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.

  • Malwarebytes Endpoint Protection & Response (EDR)

    Sponsored by: Malwarebytes

    According to a study, close to 60% of endpoints harbor hidden threats. These threats can disrupt productivity and cause financial and legal damage. In this solution brief, explore Malwarebytes’ Endpoint Protection and Response (EDR) platform and uncover its key features and benefits.

  • Emerging Technology Analysis: SOAR Solutions

    Sponsored by: ThreatQuotient

    Although SOAR and SIEM share similar security capabilities, they are distinct markets unlikely to consolidate. However, technology leaders at SOAR providers need to understand this distinction in order to build upon existing SIEM services. This deep dive from Gartner focuses on SOAR and offers recommendations for SOAR providers.

  • Threats of Surveillance Tools: Spyware and Stalkerware

    Sponsored by: RSA Conference

    Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.

  • ThreatQ for Government Agencies

    Sponsored by: ThreatQuotient

    As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.