ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • 2020 Data Breach Investigations Report

    Sponsored by: Verizon

    Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Read on to unlock the complete 119-page report overviewing this year’s findings.

  • 2020 Global Threat Report

    Sponsored by: Crowdstrike

    Each year, the CrowdStrike Intelligence team releases a report of their findings from looking into cyberattack trends and emerging adversaries over the previous year. This year’s report examines key trends in ransomware and eCrime as well as an overview of state-sponsored adversaries and their suspected motives.

  • 2020 Remote Workforce Cybersecurity Guide

    Sponsored by: Automox

    The sudden and dramatic fashion in which organizations had to enable nearly their entire workforce to operate remotely has brought about a new set of security challenges that need to be addressed. Download this white paper to explore these new threats and discover how to address them without increasing cost or complexity.

  • 2020 SIEM Vendor Comparison Report

    Sponsored by: IBM

    Gartner named IBM a Leader in the latest Gartner Magic Quadrant for Security Information and Event Management (SIEM). In the report, Gartner placed IBM furthest to the right for "Completeness of Vision."

  • 2020 SonicWall Cyber Threat Report

    Sponsored by: SonicWall

    Each year is a constant struggle between cybercriminals attempting to conduct successful attacks and organizations defending their users and data. 2019 was a good year for organizations as malware attacks dropped by 6%. Read on to uncover key statistics and insights about last year’s cyberattack trends.

  • 2020 State of Enterprise Cloud Adoption and Security

    Sponsored by: DivvyCloud

    Cloud usage has been growing steadily over recent years, and that trend is expected to continue. However, misconfigurations and data breaches have led to security concerns. This report highlights the findings from a 2019 study into enterprise cloud adoption as well as security and compliance challenges. Read on to uncover the results.

  • 2020 State of Malware Report

    Sponsored by: Malwarebytes

    Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.

  • 2020 Trustwave Global Security Report

    Sponsored by: SingTel

    This annual Trustwave Global Security Report provides a comprehensive look at the methods and techniques used by cybercriminals in order to provide valuable insight into ever-changing threat landscape. Download this report for an in-depth analysis of data compromise, email threats, malware, network security and more.

  • 2020 Vulnerability and Threat Trends

    Sponsored by: Skybox Security

    Enterprise growth is a double-edged sword – the more complex and distributed a business environment becomes, the larger the attack surface becomes. In this report, explore vulnerability and threat trends across 2020, including emerging threat vectors, disruptive attack methods, vulnerable operating systems, and more.

  • 22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers.

    Sponsored by: ComputerWeekly.com

    In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now.

  • 3 Indicators to Monitor for Business Email Compromise (BEC)

    Sponsored by: CI Security

    Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.

  • 3 Powerful Ways to Slash Mobile App Security Costs

    Sponsored by: NowSecure

    There’s never a bad time to find ways to cut costs, enhance productivity and expand security capabilities – especially when it comes to the constantly evolving mobile application landscape. Download this white paper to review 3 scenarios that showcase how automating mobile app security testing can save money while fostering productivity.

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • 4 Reasons to Add UBA to Your SIEM

    Sponsored by: Splunk

    To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.

  • 4 Steps to Cloud Access Management

    Sponsored by: Thales

    Today’s organizations rely on cloud-based applications as a critical aspect of their environment. However, deliberate security considerations need to be made in order to protect the sensitive data in these cloud tools. In this white paper discover 5 common challenges and 4 actions organizations can take to full cloud access management.

  • 5 Essential Elements of a Comprehensive Endpoint Security Strategy

    Sponsored by: CyberArk Software, Inc

    Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.

  • 5 Key Ways CISOs Can Accelerate the Business

    Sponsored by: Splunk

    According to a Forrester study, the role of the chief information security officer (CISO) has changed. Today's CISOs are expected to weigh in on board-level security decisions and map out security programs that meet business objectives. Read on to discover 5 key practices CISOs can implement to help them on their security journey.

  • 5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile

    Sponsored by: NowSecure

    Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.

  • 5 Questions Every CIO Must Answer in the Coronavirus Age

    Sponsored by: Hitachi Vantara

    The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).

  • 5 Reasons to Make Virtual Support Agent Adoption a Priority

    Sponsored by: Serviceaide

    Inside, find a list of five reasons to consider a virtual support agent, including improved service user experiences, increased automation opportunities, and more.

  • 5 Security Recommendations for CIOs Managing a Digital Transformation Program

    Sponsored by: Dell SecureWorks

    In order to establish an effective digital transformation program, organizations must maintain a balance of agility, cost reduction and innovation, with security as a supportive underline. Read this white paper to discover 5 ways CIOs can maintain security during a digital transformation.

  • 3 Big data security analytics techniques you can apply now to catch advanced persistent threats

    Sponsored by: Hewlett Packard Enterprise

    In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.

  • 4 Questions to Ask When Evaluating Network Security Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.

  • 4 Secrets to Meaningful Security Discussions with the Board of Directors

    Sponsored by: Citrix

    This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.

  • 5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing

    Sponsored by: APTARE

    In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.