ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft Research

  • Preventing identity theft in a data breach

    Sponsored by: ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • The New Normal of Securing Remote Workers

    Sponsored by: Palo Alto Networks

    67% of organizations plan on keeping work from home policies in place long-term or permanently, according to a recent survey. As a result, organizations need to turn their focus to building and scaling a work-from-anywhere workforce. In this webcast, uncover best practices for enabling a work-from-anywhere workforce.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Palo Alto Networks

    Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.

  • Aruba Clearpass Network Access Control

    Sponsored by: TechData

    In this white paper, learn how mobility and IoT are changing how organizations approach network access control (NAC) and how switching to security tools like Aruba Clearpass can help detect threats before damage occurs.

  • SASE: A How to Guide

    Sponsored by: Apcela

    In this webcast, join Mark Casey and Kunal Thakkar of Apcela as they show how enterprises are creating a Secure Access Service Edge (SASE) network security architecture built for the cloud.

  • Fortinet Delivers a Flexible SASE Solution

    Sponsored by: Fortinet, Inc.

    Networks have been fundamentally transformed by digital innovation, cloud adoption, and the recent widespread shift to remote work. Increased reliance on cloud resources and environments has necessitated a new approach to secure network access. Jump into this white paper for an up-close look at SASE, which can support dynamic secure access needs.

  • Twitter Phone Spear Phishing Attack

    Sponsored by: Lookout

    On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.

  • Key Elements to Successful High-volume Distributed Card Issuance

    Sponsored by: HID Global

    In this white paper, learn about key elements of a productive, secure and reliable distributed credential issuance system.

  • Predictive Identity: A Key Enabler for a Successful Merger or Acquisition

    Sponsored by: SailPoint Technologies

    This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.

  • SailPoint Identity is Security

    Sponsored by: SailPoint Technologies

    If you can’t see who has access, know what your users are doing, automatically modify or terminate access, or flag suspicious activity, your organization’s security had identity-shaped holes it. In this short video, learn how to secure your organization SailPoint Identity.

  • IdentityNow Short Video: Separation of Duties

    Sponsored by: SailPoint Technologies

    Separation of Duties (SOD) is an internal control mechanism designed to prevent error and fraud by ensuring at least two individuals are responsible for separate parts of any high risk or sensitive tasks. SOD policies for identity systems, however, can be difficult and complex to manage. Find out how IdentityNow makes it easier.

  • Onfido & Sidehide Case Study

    Sponsored by: Onfido

    Sidehide is enabling “one-click hotels”, offering users a seamless booking and check-in experience. But in order to build this, Sidehide identified three challenges to overcome: local regulations, fraud, and user experience. In this case study, find out how Onfido allowed them to combat these challenges with trusted identity.

  • Sailpoint Final

    Sponsored by: SailPoint Technologies

    When a company has over 10,000 employees, over 100 applications, and different privileges within those applications, there’s a lot to protect. That’s why SailPoint simplifies identity management for enterprises with automation. View this short video to learn more.

  • Aruba ESP With Zero Trust Security: Security for the Edge

    Sponsored by: Aruba Networks

    In this brief, learn how Aruba ESP with Zero Trust Security can help improve an organization’s overall network security posture by applying a more rigorous set of security best practices and controls to previously trusted network resources.

  • Tax Scammers: Gone Phishing This Tax Season

    Sponsored by: Farsight Security

    Each tax season, thousands of Americans are scammed out of millions of dollars. In fact, according to an FTC report, nearly 1 in 10 people were victims of imposter scams last year, amounting to roughly $667 million lost. The following white paper highlights common tax scams to watch out for (according to the IRS) and how to prepare for them.

  • Equifax and the 147 Million: One Individual’s Story from behind the Headlines

    Sponsored by: Auth0

    What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.

  • The Network for the Digital Business Starts with the Secure Access Service Edge (SASE)

    Sponsored by: Cato Networks

    Networking and security are slowing down the business as silos, built decades ago, are stretched and patched to accommodate emerging business requirements. In this white paper, learn how networking and security can become part of the IT platform for the digital business with a single cloud-based service: Secure Access Service Edge (SASE).

  • Finds Cost- and Time-Savings with IdentityNow

    Sponsored by: SailPoint Technologies

    Banking is built upon the transactions it performs daily, and Orrstown Bank needed a solution that could be quickly deployed while also protecting the data and integrity of its transactions. In this case study, learn how Orrstown Bank was able to meet these needs by deploying SailPoint IdentityNow.

  • How to Know It’s Time to Change Your Identity Vendor

    Sponsored by: SailPoint Technologies

    Changing identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.

  • 4 Ways SailPoint Predictive Identity Puts You in Control

    Sponsored by: SailPoint Technologies

    As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.

  • Creating an Identity-Aware Organization from Infrastructure to Users

    Sponsored by: SailPoint Technologies

    Cybercriminals are no longer just hacking through your firewall to gain entry to your infrastructure. They have found another, easier path in – your users. In this white paper, learn how identity management is key to ensure a secure, compliant and efficient infrastructure.

  • How to Survive a Bank Robbery

    Sponsored by: Splunk

    Today's organizations are plagued by a myriad of cyberthreats designed to target their sensitive data and disrupt their business operations. Is your organization prepared in the event of a cyberattack? This guide is designed to prepare you to survive the 10 most common threats. Read on to learn more.

  • Comprehensive Lifecycle Management

    Sponsored by: Insight

    The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.

  • Behavioral Biometrics: The Intelligent Safeguard Against Online Fraud

    Sponsored by: Buguroo

    Behavioral biometrics can help users identify people by the unique way they interact with different devices, including computers (keyboard and mouse use), tablets or smartphones. Read on to learn how you can utilize behavioral biometrics techniques and AI deep learning algorithms to detect and predict cybercriminal activities at your organization.

  • Security Access Controls Over Identities Must Be Priority

    Sponsored by: SearchSecurity.com

    No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.