ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Improving Cybersecurity with ITAM: An Equifax Case Study

    Sponsored by: Snow Software

    Leveraging IT Asset Management (ITAM) can help protect your organization from the repercussions of data breaches. And with data breaches becoming an increasing occurrence, organizations must re-evaluate their current security environment. In this webinar, learn how ITAM can augment your cybersecurity strategy today.

  • Protecting Privileged Access Is Critical to the Protection of a Company’s Crown Jewels

    Sponsored by: CyberArk Software, Inc

    In this infographic from Privileged Access Security for Dummies, discover some tips & best practices when it comes to protecting your company’s data. Learn how to: Secure critical information, reduce cyberattack risk, and take preventative security action.

  • Advanced Data Protection for Midsize Enterprises

    Sponsored by: InteliSecure

    Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.

  • Webinar: Financial Crime

    Sponsored by: SAP Concur

    On Wednesday, 13 November 2019, 11:00am AEDT, join SAP Concur for a 40-minute live webinar on Fraud, Risk & Compliance and why prevention and early detection is your strongest weapon against increasingly sophisticated financial crime.

  • Cloud Security Analytics and Policy Management

    Sponsored by: Fortinet, Inc.

    When it comes to securing public cloud resources, integration of security controls helps organizations protect data, prevent intrusions, fight threats, and satisfy auditors. Discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.

  • Why Security Architects Struggle to Manage Risk in Multi-cloud Environments

    Sponsored by: Fortinet, Inc.

    With cloud adoption increasing, security architects must rethink their cloud management strategies. Risks can range from misconfiguration of security controls to unclear responsibilities. Continue reading to learn more about these security risks, and why they should be top-of-mind.

  • TITUS Times: The Politics of Data Protection

    Sponsored by: TITUS

    Most breaches that occur at the end user level aren’t malicious. The ideal security strategy addresses people, processes and policy with serious consideration given to the end user. So, rather than dictate policies, involve your end users as you develop your security strategies. Discover why it is critical to focus on the end user’s point of view.

  • Are You The Weakest Link?

    Sponsored by: Cyberfort

    Senior executives are highly-targeted individuals. They have access to the most important company data and information. This makes them the weakest link in the cybersecurity chain. In this white paper, learn why a “security-first” mentality can help defend against potential threats.

  • Enhancing IoT Visibility and Security

    Sponsored by: Extreme Networks

    Many IoT devices were designed without imbedded security features, which is posing a security risk to many organizations. In this webcast, learn about the risks and attacks associated with IoT, how to approach IoT security, and how Extreme solutions can help.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath

    Sponsored by: LexisNexis® Risk Solutions

    In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.

  • Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.

  • The Benefits of Automating Security with SOAR Tools

    Sponsored by: ServiceNow

    Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.

  • 2019 True Cost of Fraud Study

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis Risk Solutions 2019 True Cost of Fraud Study explores the evolution, expansion and cost of fraud to deliver insights and recommendations on how to effectively sustain your business, successfully manage fraud risks and strengthen customer trust and loyalty. Download the report to explore key findings.

  • Secure by Design: A Roadmap to Cybersecurity Success

    Sponsored by: Cyberfort

    The changing threat landscape, at first glance, seems complicated. However, there are methods to mitigate threats that will not adversely impact your business operations. In this white paper, learn how to assess your security posture and provide the tools necessary to enable your organization to take a more holistic approach to cybersecurity.

  • Ponemon Institute Report: Client Insights on Data Protection with IBM Security Guardium

    Sponsored by: IBM

    How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.

  • Ponemon Institute Report: Client Insights on Data Protection with IBM Security Guardium

    Sponsored by: IBM

    How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.

  • Retailers are Creating More Opportunity for Fraudsters

    Sponsored by: LexisNexis® Risk Solutions

    Fraudster are exploiting digital channels and seizing more opportunities across a diverse set of retailers. Learn more about fraud attempts, targets, driving factors, top challenges and recommendations in this infographic.

  • A Framework for Cybersecurity and Compliance

    Sponsored by: OneNeck IT

    In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.

  • Securing Your SWIFT Environment Using Micro-Segmentation

    Sponsored by: Illumio

    All SWIFT customers must self-attest to their compliance with the SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations. In this white paper, explore 3 challenges that prove especially difficult for SWIFT customers looking to achieve compliance.

  • Application Dependency Mapping

    Sponsored by: Illumio

    To understand and eliminate the security blind spots in your application environment, the first step is to visualize all your application components and how they are interconnected. In this white paper, learn everything you need to know about application dependency mapping.

  • Accelerating Security Response

    Sponsored by: ServiceNow

    While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.

  • Forrester Report: Use advanced encryption for data security

    Sponsored by: IBM

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.

  • Forrester Report: Use advanced encryption for data security

    Sponsored by: IBM

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.

  • Efficient Threat Remediation with Check Point and ServiceNow

    Sponsored by: ServiceNow

    Discover how security administrators can create, orchestrate, and efficiently process block list requests for malicious sites using ServiceNow Security Operations and Check Point Next Generation Threat Prevention Gateways.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.