ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Building a High-Speed SOC

    Sponsored by: VMware International Unlimited Company

    87% of organizations today feel it’s difficult to recruit and hire cybersecurity talent. The effects of this skills gap are obvious: security teams will be unable to keep pace with the growing volume of threats. In this white paper, discover how the right balance of skilled workers, processes and technology can produce an effective SOC.

  • Best Practices for Securing Critical Infrastructure for State & Local Governments

    Sponsored by: VMware International Unlimited Company

    For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.

  • How to Build A World-Class Cybersecurity Practice

    Sponsored by: BlueVoyant

    Cybersecurity is a constant chess match between organizations and criminals. As adversary tactics evolve, so too should the methods of the organization. This e-book offers the expertise of five BlueVoyant cybersecurity leaders with regards to today’s risks, which tools to use, and tips for building your security system. Read on to get started.

  • YARA-L: A New Detection Language for Modern Threats

    Sponsored by: Chronicle

    When it comes to threat detection and incident investigation, most organizations turn to SIEM, SOAR or another similar approach for analyzing security data. However, analyzing data is made more challenging by the increasing amount being generated. In this white paper, learn more about YARA-L, a new detection language for analyzing threat data.

  • SASE Series, Part 2: The Security View

    Sponsored by: Hughes Network Systems

    A term coined by Gartner, Secure Access Service Edge (SASE) is an approach to network security designed to be the successor to data centers as organizations shift their data and endpoints to the cloud. In this blog post, dive deeper into the SASE approach, the growing attack surface, and its relationship with zero trust.

  • DDoS Attack Protection & Prevention for your Enterprise

    Sponsored by: OVHCloud

    How can you prevent a DDoS attack, and what are the steps you can take to keep your networking environment secure? In this e-guide, learn about the options for cost-effective DDoS protection today.

  • 13 Email Threat Types to Know about Right Now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • Backup - Cyber Security's Last Line of Defense

    Sponsored by: Cobalt Iron

    Access this webcast to hear from Doug Chando, Solutions Architect at Cobalt Iron, and Jason Cray, CI and Storage Architect at Sirius, who discuss the role of data protection in cyber security, why backup is your last line of defense, how a secure backup environment should look, and more.

  • Growing Profits and Achieving Compliance with Privacy by Design

    Sponsored by: Dell Boomi and Slalom

    In order to meet the demands of new data privacy laws and changing customer attitudes, organizations need to prioritize data protection above all else. However, if data privacy was built-in from the start, it could be used as a competitive advantage. This e-book highlights best practices and strategic advice for how to achieve this.

  • Duo for Device Trust

    Sponsored by: Duo Security

    As organizations continue to enable employees to work remotely and interact within their own devices, mobile security becomes an increasingly critical piece of the security strategy. In this solution brief discover how Duo’s zero trust approach offering can help organizations meet their security and compliance goals.

  • A Virtual, Vigilant Watcher

    Sponsored by: Cloud4C

    In this white paper, discover the highlights of a workshop aimed at enhancing user awareness and understanding of Azure Sentinel, a cloud-native SIEM and SOAR tool by Microsoft, designed to support organizations with threat detection and response for the risks specific to their network, infrastructure and data. Read on to learn more.

  • MITRE ATT&CK Workbook

    Sponsored by: VMware International Unlimited Company

    The MITRE ATT&CK framework has had a clear objective since its inception: develop a knowledge base around known cyberthreats and tactics to help organizations stay prepared. This workbook is designed as a starting point for organizations interested in leveraging the MITRE ATT&CK framework to improve their security posture.

  • Building the Business Case for Improving Endpoint Security

    Sponsored by: VMware International Unlimited Company

    According to VMware Carbon Black’s latest Global Threat Report, cyberattackers are targeting endpoints at an increasing rate. So now you must get your boss, and other executives in agreement – but how? This white paper outlines how to build a business case for endpoint security investment. Read on to get started.

  • Everything You Should Know About Cybersecurity Assessment, Planning & Response

    Sponsored by: BlueVoyant

    Today’s threat landscape necessitates thinking about security in terms of when, not if, an attack will occur. In this e-book, join Austin Berglas, an Army Veteran with decades of experience in cybersecurity both in the private sector as well as for the FBI, as he breaks down the current challenges & remedies for today’s breaches.

  • State of Software Security: Volume 10

    Sponsored by: Veracode, Inc.

    For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.

  • Privacy by Design: Consumer Data Protection as a Competitive Advantage

    Sponsored by: Dell Boomi and Slalom

    As a result of the disastrous amount of data and PII stolen from successful cyberattacks over recent years, data privacy laws were introduced to ensure the protection of consumer data and dictate how businesses use that data. In this infographic, learn how regulatory compliance can be used as a competitive differentiator – even an advantage.

  • Don’t Give Away Keys to Your Kingdom with ADFS

    Sponsored by: PortSys

    For years, organizations have been using Active Directory Federated Services (ADFS) to manage access to cloud applications. However, sole reliance on ADFS for managing these accounts can introduce risks. In this article, discover how Total Access Control (TAC), Portsys’ zero-trust offering, can help protect ADFS accounts from cyberattacks.

  • Zero Trust - The Citrix Way

    Sponsored by: Citrix

    For those who work in IT and security, whack-a-mole can sound a lot like their day-to-day jobs: Waiting for incidents to ‘pop up’ and reacting accordingly. But what if you knew where the problem holes were, and could cover them permanently? This article outlines the zero-trust approach, why it works, and how to achieve it.

  • Advanced Threat Protection and Vulnerability Management

    Sponsored by: Cloud4C

    Ransomware has grown into one of the costliest disruptions both in terms of attack frequency and breach cost. To stop these constant threats, IT security teams are turning to SIEM approaches. In this brochure, take a closer look at some of the flaws in SIEM, and discover an approach that may be better suited to prevent ransomware attacks.

  • What Is Intrinsic Security?

    Sponsored by: VMware International Unlimited Company

    In this video, join Tom Corn, Senior Vice President of security products at VMware as he defines the concept of intrinsic security and outlines the value it can bring to your security efforts as well as business operations as a whole.

  • Risk & Response: Defending Financial Institutions

    Sponsored by: VMware International Unlimited Company

    Each year, the financial industry remains at the top of the verticals targeted by hackers – who typically look to exploit endpoints. This white paper provides additional financial industry threat insights, as well as an overview of an endpoint detection and response offering that may be able to help.

  • Industry and Financial Regulations: The Implications for Application Security

    Sponsored by: Veracode, Inc.

    Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.

  • Increase Security and Compliance with Advanced Automation

    Sponsored by: Red Hat

    Security is a top concern among telecommunications organizations, especially when it comes to securing customer data and meeting compliance requirements. In this solution brief, look at the features of Red Hat’s automated security and compliance offerings and discover how they can help your organizations achieve security and compliance benchmarks.

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • E-commerce has been revolutionized in the last decade

    Sponsored by: The Media Trust

    Most brands don’t control or manage 65-95% of the code that defines the digital shopping experience. While this code enables critical features, it exposes organizations to potential security risks. In this webinar, take a closer look at third-party risk areas and discover how to address these challenges.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.