ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • 2020 Cybersecurity Trends: Consolidation, Cloud, and Convergence

    Sponsored by: Cisco Umbrella

    As today’s workforce becomes increasingly distributed, organizations need to consider network access that goes beyond the data center. In this e-book, see where the security landscape is heading, identify the gaps in today’s security tactics, and highlight the steps you can take to protect your organization, today and tomorrow.

  • Punycode: Awareness and Protection

    Sponsored by: Cisco Umbrella

    The topic of this episode of A Cybersecurity Technical Mini Series: Punycode. But what is Punycode, how does it work & why is it important? To find out, join Chris Riviere, a security expert at Cisco as he further explores this malicious domain tactic.

  • How to Protect Organizations from New Ransomware Trends & Methods

    Sponsored by: CrowdStrike

    Each year, ransomware attacks grow increasingly frequent and successful – leading to more dollars lost. In fact, by 2021 global damages from ransomware is expected to reach $20 billion. In this white paper, you’ll discover a comprehensive overview of the evolution of ransomware, common trends and how to protect against it.

  • Cloud Native Security

    Sponsored by: Rackspace

    The global shift towards cloud tools and capabilities has completely changed the cybersecurity landscape. Now more than ever, organizations need to re-evaluate their cloud security strategy to reflect today’s challenges. In this webcast, join security experts at Rackspace and AWS as they discuss these challenges and explore how to address them.

  • MSPs Can Turn the Rising Ransomware Threat into Revenue

    Sponsored by: Acronis

    Dive into this white paper to learn the three most common ways MSPs capitalize on the growing ransomware threat through baked-in features – and the most common shortcomings that follow.

  • Okta ASA Netskope Private Access demo

    Sponsored by: Okta + Netspoke

    In this video demo, join a Solutions Architect at Okta as they provide a quick walkthrough of how Okta Advanced Server Access & Netskope Private Access can work together to enhance user experience.

  • Application Control and Critical Infrastructure Protection

    Sponsored by: VMware International Unlimited Company

    Reducing unscheduled downtime of critical systems as a result of a cyberattacks should be at the top of every organization’s security to-do list for this year. VMware Carbon Black wants to help. Read this data sheet to learn about their App Control offering, designed to eliminate unplanned downtime and protect critical systems at scale.

  • 10 Endpoint Security Problems and How the Cloud Solves Them

    Sponsored by: VMware International Unlimited Company

    In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.

  • Secure Everywhere: The Power of Integrated Internet, Endpoint, And Email Security

    Sponsored by: Cisco Umbrella

    In order to overcome the hurdles of today’s ever-increasing cybersecurity skills gap, IT and security team leaders are constantly on the lookout for ways to use their existing resource more efficiently. Read this e-book to learn more about an integrated approach to security that maximizes efficiency and intelligence across disparate systems.

  • Top 10 Considerations When Choosing a Privileged Access Management Solution

    Sponsored by: CyberArk Software, Inc

    Several powerful PAM solutions are now on the market. Which one is right for your organization? Find out from IT Central Station members who offered insights based on their experiences with the CyberArk Privileged Access Security (PAS) solution.

  • Protecting Against the 10 Most Critical Web Security Risks

    Sponsored by: Progress Software Corporation Sitefinity

    This infographic identifies the top 10 most critical security risks to web applications – as outlined by the Open Web Application Security Project (OWASP) – and explores tactics and advice for defending against each threat. Read on to get started.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

  • Cognitions of a Cybercriminal

    Sponsored by: VMware International Unlimited Company

    Cybercriminals grow increasingly creative each year, finding new ways to bypass security methods without detection. This white paper is designed to help CISOs in their pursuit of cybercriminals by offering an inside look into the mindset of their behavior and breaking down their attack patterns. Access now to reserve your copy.

  • HOW TO COMBAT Ransomware

    Sponsored by: VMware International Unlimited Company

    Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.

  • Automating Your Vulnerability Remediation Process

    Sponsored by: Vulcan

    The vulnerability management lifecycle is a time-consuming set of tasks, making it a perfect candidate for integrating automation into the process. But how should organizations go about this? This whitepaper provides a set of examples and uses cases for what to do. Read on to get started.

  • Justify Your Vulnerability Management Program

    Sponsored by: Vulcan

    In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.

  • The Big Easy - 3 steps for better security

    Sponsored by: Cisco Umbrella

    In this video, take a look at the 3 most common threat vectors, and discover best-practices for detecting, isolating and mitigating these threats before they have a chance to strike.

  • The Top 5 Mistakes That Everyone in Vulnerability Remediation is Making

    Sponsored by: Vulcan

    Cyberattackers are growing cleverer with each passing year, exposing new vulnerabilities and exploiting old ones to cause costly and disruptive breaches. Its time for organizations to fight back. In this white paper take a closer look at the top five most common mistakes in vulnerability management and how to avoid them.

  • Introduction to Cloud Security Blueprint 2.0

    Sponsored by: Checkpoint Software Technologies

    According to a Gartner study, cloud security remains a top concern for users, and the shared environment of public cloud invites a unique set of vulnerabilities. This white paper defines key cloud security concepts and explores architectural principles in order to help you get started with protecting your cloud environment. Read on to get started.

  • Beginners Guide – Securing Legacy Devices

    Sponsored by: NetLib Security

    Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: IBM

    Growing in usage, security information and incident response (SIEM) capabilities enable organizations to aggregate and process event data across their network to detect and respond to incidents at greater speed. This Gartner Magic Quadrant report overviews and analyzes key SIEM vendors as well as their offerings. Read on to view the results.

  • 2019 CrowdStrike Global Security Attitude Survey

    Sponsored by: CrowdStrike

    Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.

  • 2020 Cyberthreat Defense Report

    Sponsored by: Gigamon

    The CyberEdge Group’s annual Cyberthreat Defense Report provides an insider look at the diverse threats plaguing organizations and the strategic approaches IT and security teams are taking to mitigate these threats. A snapshot of the key findings from this year’s report can be found in the following executive brief.

  • Cybersecurity and COVID-19: Securing Today’s Newly Distributed Workforce

    Sponsored by: CrowdStrike

    To play their part in ensuring the health and safety of their employees, organizations have quickly adopted a remote workforce model in order to maintain a semblance of ‘business as usual’. In this e-book, explore the security challenges organizations are seeing and discover how to embrace and secure a remote workforce.

  • What Is Endpoint Detection and Response (EDR)?

    Sponsored by: VMware International Unlimited Company

    As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.