ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft Research

  • Comprehensive Lifecycle Management

    Sponsored by: Insight

    The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.

  • 7 Considerations for Implementing Zero Trust

    Sponsored by: Banyan Security

    Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.

  • Zero Trust Remote Access Platform

    Sponsored by: Banyan Security

    Many modern enterprises are protected by legacy VPNs which leaves corporate assets, applications, and servers vulnerable to attack. In this brief, learn how Banyan Security’s Zero Trust Remote Access Platform addresses this challenge by shifting the access control from the network perimeter to an individual user or device.

  • A Framework for Cybersecurity and Compliance

    Sponsored by: OneNeck IT

    In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.

  • Synthetic Identity - A Rapidly Growing Global Issue

    Sponsored by: RSA Conference

    The RSA Conference eFraud Global Forum brings together anti-fraud leaders from across the world for a candid conversation about e-fraud challenges and solutions. In this webinar, hear from experts in the UK and US as they share the greatest e-fraud challenges they face—including synthetic identity—and how they fight back in this ongoing battle.

  • Pogo Paradox: Is Your Infrastructure Your Worst Enemy?

    Sponsored by: PortSys

    In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.

  • Take a Better TAC to Protect RDP

    Sponsored by: PortSys

    Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.

  • Making the Business Case for Zero Trust Access

    Sponsored by: PortSys

    Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.

  • Zero Trust Access What Does it Mean?

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • New Tech: Early Adopters Find Smart 'Zero Trust' Access Improves Security Without Stifling Innovation

    Sponsored by: PortSys

    Abused logon credentials continue to fuel the never-ending escalation of cyberattacks. However, the Zero Trust approach could be well on its way to changing this. In this blog, uncover key findings from a recent discussion Byron Acohido of The Last Watchdog, had with PortSys' CEO Michael Oldham about Zero Trust.

  • Rethinking Third-party Cyber Risk Management

    Sponsored by: CyberGRX

    In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.

  • Protecting Your Organization from Password Breaches

    Sponsored by: OneLogin

    With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.

  • Advanced AD Bridging for Prodigious IT Gains

    Sponsored by: Centrify Corporation

    Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.

  • Establish Secure DevOps Practices

    Sponsored by: Centrify Corporation

    The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.

  • 5 Steps to Minimize Your Exposure to Ransomware Attacks

    Sponsored by: Centrify Corporation

    According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

  • The Anatomy of a Hack: Perception vs. Reality

    Sponsored by: Centrify Corporation

    There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.

  • The 2019 Zero Trust Privilege Maturity Model Report

    Sponsored by: Centrify Corporation

    To provide context around the current state of Zero Trust Privilege, Centrify surveyed 1,300 information security professionals. Download this 2019 report to learn more about the Zero Trust Privilege Maturity Model and discover key findings from the survey.

  • Webinar: Latest Fraud Schemes in Retail and Hospitality

    Sponsored by: Shape Security

    Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.

  • Starbucks Combats Credential Stuffing and Account Takeover

    Sponsored by: Shape Security

    Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.

  • Security and Privacy at Armorblox

    Sponsored by: Armorblox

    Armorblox takes the security and privacy of their customers' data seriously. Download this brief to learn about their natural language platform.

  • Airline Stops Automated Attacks on Web & Mobile

    Sponsored by: Shape Security

    A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.

  • Online Retail Threats Credential Stuffing

    Sponsored by: Shape Security

    In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.

  • Zero Trust Access Video

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.

  • Accelerate ERP Threat Detection

    Sponsored by: Appsian

    Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.