ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Spectre and Meltdown Podcast

    Sponsored by: RSA Conference

    Spectre and Meltdown have the potential to affect personal computers, mobile devices, and cloud infrastructure dating back to 1995. Listen to this podcast to hear Paul Kocher's expert take on the Spectre and Meltdown cyberthreats as well as tips and insights into protecting your sensitive data from the attacks.

  • GDPR: What it Means and How to Get Compliant

    Sponsored by: SAS

    GDPR will require an ongoing, organization-wide focus to ensure you protect your customers' personal data. Any organization that does not comply could be fined up to $22 million, or 4% of their global annual revenue (whichever is greater). Access this 5-step checklist to learn how to stay GDPR-compliant.

  • Authentication-as-a-Service Improved

    Sponsored by: Entrust, Inc.

    How are you securing your enterprise and dealing with authentication protocols? This resource offers an authentication-as-a-service strategy to aid your enterprise in improving its IAM security approach.

  • Threat Territory

    Sponsored by: RSA Conference

    This resource offers insight into the ever-growing internet of threats through expert tips and startling facts to get you up to speed with the damaging threats you need to look out for and system vulnerabilities you could be missing.

  • BYOD and Device Risks within Healthcare

    Sponsored by: SyncDog

    According to Google, 87% of healthcare professionals are using mobile devices within the industry. This white paper reveals how BYOD is fueling the fire of endpoint device risk in healthcare.

  • Striking Security Gold: A Decade of Cybersecurity Insights

    Sponsored by: RSA Conference

    How has the discussion around the state of cybersecurity changed over time?This Cyentia Institute report offers a critical 10-year timeline in cybersecurity and addresses all angles of the industry conversation, from the growing hype surrounding cryptocurrency to the declining use of big data.

  • Secure Managed File Transfer: Ultimate Buyer's Guide

    Sponsored by: HelpSystems

    Files contain a multitude of sensitive information and therefore data transfers of these files need to be protected. Take a look at this buyer's guide to learn how to effectively secure file transfers by utilizing a managed file transfer (MFT) product.

  • The Route to a Trillion IoT Devices

    Sponsored by: ARM

    Find out how to make the most of the information that exists within your organization and learn about the macroeconomics of IoT.

  • Your Guide to MFA

    Sponsored by: HYPR

    Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.

  • Extending the Value of Microsoft Dynamics CRM with Data Integration

    Sponsored by: SnapLogic

    Find out how to simplify data integration in multi-vendor, hybrid IT environments so that you can break down silos, extend the value of apps like Microsoft Dynamics CRM, and generate accessible insights faster.

  • Protecting Your Distributed Data With The Cloud

    Sponsored by: Druva Software

    Download this ebook to find out if your organization is at risk and learn how cloud-based data protection can protect your distributed data to minimize risk.

  • Data Classification Services and Keeping Cloud Data Secure

    Sponsored by: Data443

    In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.

  • GDPR Looms with Organizations Still Unprepared

    Sponsored by: Data443

    GDPR regulations are looming, and not every company is prepared. In this expert e-guide, explore how data management software suppliers are trying to help companies get on track and avoid stiff GDPR penalties.

  • What Security People Want: Making DevSecOps Happen with Containers

    Sponsored by: Aqua Security

    Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.

  • Data Fabric Enabled Solutions for Hybrid Cloud

    Sponsored by: NetApp

    For many organizations, the rush to the cloud has resulted in data silos that make it impossible to fully leverage and control data. Download this white paper to see how Data Fabric can help your organization manage this challenge and others.

  • The Honeypot Project

    Sponsored by: Armor

    As the cloud gains momentum, protecting sensitive data no longer means simply safeguarding on-premises infrastructure. Take a look at this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses.

  • CW ASEAN - March 2018:┬áTime to dial up defences

    Sponsored by: ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

  • CW ANZ - March 2018:┬áReport data break-ins - it's the law

    Sponsored by: ComputerWeekly.com

    Cyber security is an increasingly global endeavour with threat actors who know no boundaries unleashing attacks from nearly anywhere in the world. In this month's issue of CW ANZ, we look at how Australia's mandatory data breach notification law underscores recent efforts to lift its cyber security game.

  • Journey to GDPR Readiness

    Sponsored by: IBM

    The GDPR represents a unique opportunity to help strengthen privacy compliance and preserve customer trust, while reducing risk exposure and creating a competitive advantage. Uncover one company's journey to GDPR readiness to help your organization prepare.

  • 2018 Cybersecurity Report

    Sponsored by: Cisco Systems, Inc.

    Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.

  • Governing Risk Data Aggregation and Risk Reporting

    Sponsored by: IBM

    Explore how new technology can help you kill 2 birds with 1 stone: Remain compliant with regulations such as GDPR, and still gain value out of your data.

  • Empower and Protect Your Organization With an End-to-End Approach to IoT Security

    Sponsored by: VMware Pulse

    McKinsey predicts the annual economic impact of the IoT could exceed $11 trillion by 2025. This white paper reveals an end-to-end approach to protecting your organization within the age of IoT.

  • Data Integration Reaches Inflection Point: Survey Results

    Sponsored by: IBM

    This report explores the results of a BizTechInsights survey that polled 369 IT professionals on the challenges of data integration. Discover the report's key findings and learn about

  • Optimizing Endpoint Security for the Enterprise

    Sponsored by: ConvergeOne

    Given the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.

  • The Security Benefits of DLP

    Sponsored by: InteliSecure

    Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.