ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • Who needs malware? How Adversaries use Fireless Attacks to Evade your Security

    Sponsored by: CrowdStrike

    According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    Sponsored by: ComputerWeekly.com

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

  • Avoid Cyberattacks and Save Money by Holding Less Data

    Sponsored by: Evident

    Now more than ever before, data is at the heart of every organization. However, cybercriminals have increasingly targeted data because it's both monetarily lucrative and easier to steal than actual dollars. In this white paper, learn how your company can protect itself from a breach, and how data minimization can reduce the risks of cyberattacks.

  • Artificial Intelligence (AI) in Cybersecurity: Stopping Fileless Attacks

    Sponsored by: Ziften

    AI has a growing role in cybersecurity as AI-based cybersecurity systems are outperforming traditional antivirus software. AI security models are proving to be particularly effective in defending endpoints against "fileless" attacks. In this blog, learn more about fileless attacks and how to defend against them.

  • Piedmont HealthCare (PHC) Deploys Pure and Cohesity for a Modern Storage Solution

    Sponsored by: Cohesity

    For Piedmont HealthCare (PHC), a partial SQL backup would take up to 10 hours—whereas now they complete it in less than 2 and never spill over into production. How did they achieve this feat and establish secure backup for over 100 VMs, 5 SQL backups, and 1 physical server? Download this case study to find out.

  • Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.

  • Data Protection is a Business Challenge

    Sponsored by: Veritas

    Outages and data losses can have terrible business consequences. They are not simply short-time events; they cause significant, lasting disruptions. Direct loss of revenue is just the beginning of the potential negative outcomes from outages and data loss. In this infographic, learn about the data protection challenges that organizations face.

  • Simplify Database Deployment Across Kubernetes Clusters

    Sponsored by: HammerSpace

    This brief details a tool that simplifies scaling and deploying databases across multiple clusters by abstracting data from the infrastructure to make it instantly available to any cloud or cluster. This is your chance to view it now.

  • 2018 State of IBM i Security Study

    Sponsored by: HelpSystems

    Cyberthreats are becoming more sophisticated every year, raising the importance of proper security controls. Weak passwords, lax system auditing, and overly privileged users leaves your server vulnerable to internal and external threats. In this research report, learn about the full extent of IBM i security exposures and how to correct them.

  • The future of databases in APAC

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the promises of autonomous databases, why relational databases are poor at running digital transformation projects, and why Amazon Web Services decided to switch off its Oracle data warehouse.

  • Taming Hadoop: Storage Tiering for Big Data

    Sponsored by: Western Digital

    This white paper examines how tiered storage helps organizations ingest, store, and analyze more data to glean deeper insights—at a realistic TCO. Keep reading for a comparison of tiered storage vs. traditional all-HDD symmetrical systems.

  • Oracle - Autonomous computing that declines a special name

    Sponsored by: ComputerWeekly.com

    In this e-guide, follow Oracle's twin paths to adding AI and delivering software over the cloud – on its own platform and infrastructure as a service, from 2017 to 2018. An over-arching theme of Oracle's case regarding its infusion of machine learning and its declared re-architecting of its cloud delivery has been security, security, security.

  • Jargon buster guide to database management

    Sponsored by: ComputerWeekly.com

    This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.

  • Data protection: Not just about personal data and compliance

    Sponsored by: ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • Cloud Computing in Healthcare: CIOs Embrace the Benefits and Value

    Sponsored by: Salesforce.com

    Healthcare orgs are now seeing the value of cloud computing and its role in value-based care, pop health and patient engagement. Inside this expert guide, uncover opinions of 4 CIOs on 3 well-known cloud computing options and benefits of cloud computing in healthcare. Plus, explore a Q&A with Joshua Newman, Chief Medical Officer at Salesforce.

  • Mastering the Art of Database Backup and Recovery

    Sponsored by: Oracle Corporation UK Ltd

    DBAs are usually concerned with backing up their databases, but they should spend more time focusing on database recovery as part of the backup process. Read this expert guide to learn how to cover all your DB recovery bases and how to back up data more efficiently.

  • GDPR: The Race is on for Compliance

    Sponsored by: Dell SecureWorks

    Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.

  • How to Manage Oracle E-Business Suite Apps and Databases

    Sponsored by: Data Intensity

    In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.

  • Don't Rush into Cloud Databases without a Well-Grounded Plan

    Sponsored by: Data Intensity

    In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.

  • Sizing up Oracle Upgrades: Exadata with Oracle Database 12c

    Sponsored by: Oracle

    In this expert e-guide, 20-year industry veteran Brian Peasley explores the top 10 reasons for upgrading Oracle databases to 12c. Discover how DBAs can improve their management of Oracle systems and how Oracle Exadata Database Machine enables analytics, batch, reporting, and other tasks to run simultaneously across databases.

  • 10 Reasons to Upgrade to Oracle Database 12c

    Sponsored by: Oracle

    Let Brian Peasland, a DBA with over 20 years of experience, explains why you should upgrade to Oracle Database 12c. Learn about how you can gain increased back-end support, updated hardware and OS, security patches and more inside.

  • The Enterprise Guide to SAP HANA's Cloud Models and Migration Checklist

    Sponsored by: UXC Oxygen and Amazon Web Services

    If you're considering HANA but are unsure about SAP's models of cloud computing, you'll want to fully outline your deployment options before migration. Discover three options for cloud-based HANA, as well as 6-point checklist for crafting a successful cloud migration strategy.

  • AWS Lowers Cost Barriers for SAP HANA and Database Migrations to the Cloud

    Sponsored by: UXC Oxygen and Amazon Web Services

    Although SAP deployments are currently dominated by appliances, more companies are tapping the cloud. But is cloud deployment a smart decision for you? Download now to weigh SAP HANA on-premises options against their cloud offerings. Also, discover how AWS' new tools will lower cost barriers for database cloud migrations.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.