Research Library

Powered by

Cybersecurity Research

  • Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?

    Sponsored by:

    In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.

  • Everything You Need to Know About the Log4j Vulnerability

    Sponsored by: TechTarget

    Here, dig into the origins of the Log4J vulnerability, the severity, and what needs to change to ensure enterprise systems aren't at risk in the future.

  • Computer Weekly - 14 December 2021: The rules for a safer internet

    Sponsored by:

    In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.

  • A Computer Weekly buyer's guide to post-Covid-19 supply chain management

    Sponsored by:

    The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.

  • The Benefits of Using a Data Driven Approach to Risk Management

    Sponsored by: Ostendio


  • Computer Weekly - 23 November 2021: Can the tech community show how to save the world?

    Sponsored by:

    In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.

  • Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms

    Sponsored by: Schneider Electric

    Enter this whitepaper to learn about the security aspects that go into developing and operating digital, cloud-based remote monitoring platforms built to keep data private and infrastructure systems secure from attackers.

  • CPP Associates Security Practice

    Sponsored by: CPP Associates

    Like any sect of criminal, cybercriminals thrive in times of crisis – such as the COVID-19 pandemic that impacted nearly everyone. This short video highlights some of the changes in the threat landscape and overviews the key functions and capabilities of CPP Associates’ security offerings.

  • Analysing The Economic Benefits Of Proofpoint Insider Threat Management

    Sponsored by: Proofpoint

    As organizations continue to invest in cybersecurity tools and capabilities, it’s critical that they understand the total economic impact of a buying decision. Read this research report from ESG to unlock a comprehensive analysis into the economic benefits of Proofpoint’s Insider Threat Management (ITM) platform.

  • Driving Real Behaviour Change

    Sponsored by: Proofpoint

    There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.

  • The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud

    Sponsored by: Proofpoint

    With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).

  • Infographic: 4 types of ransomware

    Sponsored by:

    Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.

  • Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease

    Sponsored by:

    In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.

  • Ransomware Weather Report - July 2021

    Sponsored by:

    In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.

  • Computer Weekly - 9 November 2021: How a cloud-first strategy helped save animals in the pandemic

    Sponsored by:

    In this week's Computer Weekly, we talk to the RSPCA about how its cloud-first strategy helped to save animals throughout the pandemic. Data warehouses have been part of the IT landscape for 30 years – but are they now old technology, and what's next? And we assess how Brexit has affected risk and resilience in the datacentre. Read the issue now.

  • CECABANK automates mainframe administration task and event security management

    Sponsored by: Beta Systems

    As part of a larger digital transformation, Spain-based CECABANK wanted to automate their mainframe administrative tasks and even security management without compromising their ability to remain GDPR complaint. Read this case study to learn more about CECABANK’s initiative and discover how they achieved success.

  • _beta access: General Use Cases

    Sponsored by: Beta Systems

    In this short video, take a closer look at some of the common challenges organizations face when using Resource Access Control Facility (RACF) and discover how Beta Systems can help to address these pain points – watch now to get started.

  • Identity Management vs. Authentication: Know the Difference

    Sponsored by: Beta Systems

    In order to secure and manage access to your critical data, it’s important to understand the differences between identity management and authentication. Read this e-guide to gain the insight you need to make an informed decision.

  • E-guide: Organize a Cloud IAM Team to Secure Software-Defined Assets

    Sponsored by: Beta Systems

    As cloud environments become increasingly complex, some progressive organizations are building their own cloud identity and access management (IAM) teams to address this specific area of concern. Read on to unlock a comprehensive guide for building your own cloud IAM team.

  • Recertification Center Garancy

    Sponsored by: Beta Systems

    In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.

  • Thales Video

    Sponsored by: Beta Systems

    It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.

  • What You Should Know about Your Identity & Access Management

    Sponsored by: Beta Systems

    This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.

  • Garancy Password Management

    Sponsored by: Beta Systems

    Passwords are more often a security detriment than they are helpful in protecting an organization against risks – which has led to a rise in password management and synchronization tools. Read this solution brief for a closer look at GARANCY Password Management, designed to bolster security while reducing complexity and costs.

  • Fast Forward IAM

    Sponsored by: Beta Systems

    In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.

  • Infographic: Ransomware timeline

    Sponsored by:

    Ransomware isn't anything new, but it remains a major challenge for individuals, companies, governments and organizations. In this infographic, we take a look at some of the most notable examples of ransomware from the past 30-plus years here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.