ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Combating Threats & Protecting Enterprise Data Across the Modern Workspace

    Sponsored by: VMware International Unlimited Company

    According to experts, attacks involving “island hopping”, which bypass security tactics with lateral movement within a network, are becoming increasingly troublesome. So, what can organizations do to counter this threat? This data sheet explores a potential answer. Read on to learn more.

  • Crowdsourced Security Testing Overview

    Sponsored by: Synack

    Crowdsourced penetration testing has shown to provide organizations with in-depth, actionable insights. However, scaling that crowd requires machine intelligence. In this solution brief, take a closer look at Synack’s Crowdsourced Security Testing, designed to combine artificial and human intelligence into one penetration testing platform.

  • Synack CISO Podcast Series: Action in Unprecedented Times

    Sponsored by: Synack

    In this episode of the Synack CISO Podcast Series, the hosts are joined by Mike Newborn, CISO at Navy Federal Credit Union, as they discuss ensuring the safety and productivity of employees during these trying times, as well as building customer trust and the increase in malicious activity. Listen to the podcast to learn more.

  • The Economics of Cybersecurity: Preparing for Ransomware

    Sponsored by: BlueVoyant

    One of the most recent evolutions of malware is ransomware, and it’s not going anywhere. In fact, it’s grown to the point where businesses need to consider it an inevitability and prepare accordingly. This e-book is designed to help you identify the cybersecurity costs needed for building a proactive defense strategy. Read on to learn more.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell Technologies

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • The Ultimate Guide to: AWS, Azure, and GCP Cloud Asset Visibility

    Sponsored by: Orca Security

    As organizations continue to embrace cloud migration, IT and security teams should reevaluate their current ability to view and analyze their cloud assets. The following guide explores current tactics and unveils a next-generation visibility and security tool designed to enable agentless visibility into AWS, Azure and GCP. Read on to learn more.

  • Proactive Incident Detection, Alerting, Remediation and Service Improvement

    Sponsored by: Cloud4C

    Today’s cyberattacks not only cause disruptions that cost money but have reputational implications as well. This brochure highlights some of the key features of Azure Sentinel, a tool that combines the features of SOAR and SIEM to help your organization modernize its security operations center and stay ahead of threats.

  • Implications of MITRE ATT&CK for Security Teams

    Sponsored by: BlueVoyant

    The MITRE ATT&CK framework is a global knowledge hub of observed cyberattack methods and tactics, designed to enable security teams with key insights for detecting and responding to an incident. This e-book offers an overview of the MITRE ATT&CK framework, its history and the implications for security teams. Read on to get started.

  • Trends & Future Outlook

    Sponsored by: BlueVoyant

    Ransomware is one of the costliest and disruptive cyberattacks plaguing organizations, and each year the list of victims grows. In this e-book, take a closer look at the current and emerging ransomware trends including how victims are targeted and proactive measures that can be taken to prevent future attack. Read on to learn more.

  • Securing Your Remote Employees with Cloud-Based Authentication

    Sponsored by: Entrust, Inc.

    Given the sudden and dramatic shift towards working from home, organizations have had to quickly enable their employees with remote access to the network. This buyer’s guide is designed to help determine which cloud-based authentication tool is best fit to meet your organization’s security needs and your employee’s operational requirements.

  • Use Your Microsoft Certificate Authority for Passwordless Authentication

    Sponsored by: Entrust, Inc.

    As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.

  • The Top 5 Open Source Vulnerabilities in Technology Companies

    Sponsored by: Sonatype

    The tech industry relies on open source technology as a competitive advantage to enable their teams to bring products to market quickly. However, this increased speed also comes with risks. In this white paper, explore the top five areas of vulnerability plaguing organizations in the tech industry today.

  • The Top 5 Open Source Vulnerabilities in Financial Institutions

    Sponsored by: Sonatype

    In terms of operational efficiency, open source is unmatched. However, for the financial industry, heavy regulations make ensuring the security of open source applications difficult to manage and prove. In this white paper, take a closer look at the top five areas of vulnerability plaguing today’s financial services organizations.

  • Cool Vendors in Cloud Office Security

    Sponsored by: Armorblox

    As organizations continue to embrace the operational benefits of cloud office suites, security leaders need to ensure that data protection isn’t overlooked. In this Gartner report, take an in-depth look at four key vendors and their innovative approaches to cloud office security, email and collaboration.

  • Never Fall Victim to DDoS

    Sponsored by: Riverbed

    A good DDoS mitigation management system is key to reducing response time. In this white paper, uncover the 6 steps of DDoS mitigation management that can help bring your network back to normal operation in case of an attack.

  • Webinar: "I Love Agent-Based Security!" Said No One, Ever.

    Sponsored by: Orca Security

    As organizations continue to rely on cloud assets and environments, the efficacy of agent-based security wanes. In this webinar, join a panel of CSOs as they break down their budget and best practices for securing their environments, discuss the hidden risks plaguing your network, and more. Watch now to get started.

  • The Imitation Game Detecting and Thwarting Automated Bot Attacks

    Sponsored by: F5 Networks

    Bot attacks pose a critical threat to today’s organizations, and traditional security methods are unfit to keep pace with security demands. The following research report contains a summary of findings from a recent study conducted by EMA. The study was designed to better understand this threat and how to prevent it. Read on to unlock the results.

  • Cloud Security Assessment Workshop

    Sponsored by: Cloud4C

    As organizations continue to migrate to the cloud, it’s critical that they don’t lose sight of their security and compliance objectives. This brochure provides an overview of what to expect in the CAF cloud security assessment workshop, designed to review your current strategy and make recommendations based on your compliance and security needs.

  • How to Combat Island Hopping

    Sponsored by: VMware International Unlimited Company

    Island hopping is a cyberattack strategy in which a hacker targets a smaller organization in order to leverage their affiliation with larger organizations as a point of entry for an attack. This white paper takes a closer look at island hopping tactics and methods for identifying and mitigating them. Read on to learn more.

  • Cybersecurity Maturity Model Certification (CMMC)

    Sponsored by: BlueVoyant

    The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.

  • Securing Your Company & Clients in this New Remote Environment

    Sponsored by: ConnectWise

    Now more than ever, MSPs need to examine the security measures they have in place now that the traditional “corporate perimeter” is out of the question. Inside this eBook chapter, learn three ways to start securing your employees and your customers.

  • How Do You Know If You Are Making the Right MSSP Choice?

    Sponsored by: BlueVoyant

    MSSPs make valuable partners when it comes to ensuring the protection of your network and data. However, the unique nature of cybersecurity requires a thoughtful MSSPs selection process. The following evaluation guide is designed to equip you with key considerations for assessing your current environment, as well as vetting future MSSPs.

  • Passwordless Experience for A More Secure and Productive Workforce

    Sponsored by: Entrust, Inc.

    Passwords are quickly becoming an outdated security tool, set to be replaced by passwordless authentication methods. In this solution brief, take a closer look at the key features and capabilities of Entrust Datacard’s passwordless authentication offering, designed to increase productivity, unify access and reduce password-related risks.

  • Cloud4C: Managed Security Services

    Sponsored by: Cloud4C

    Managed security service providers are a critical partner for organizations seeking guidance through the threat or incident lifecycle. This brochure provides a snapshot of the key features and capabilities of Cloud4C, a managed security service provider whose goal is to partner with organizations to operationalize threat data and ensure security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.