ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft Research

  • Norfolk County Council Bolsters Productivity with IdentityIQ

    Sponsored by: SailPoint Technologies

    Norfolk County Council (NCC) needed to prioritize an identity-centric security program that alleviated the growing concern over disparate systems and manual processes. In this case study, learn how NCC leveraged SailPoint to manage the identities working within their organization for all types of employment.

  • Online Retail Threats Credential Stuffing

    Sponsored by: Shape Security

    In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.

  • Zero Trust Access Video

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.

  • Zero Trust Access Today's IT Security Falls Short

    Sponsored by: PortSys

    78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.

  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Sponsored by: Menlo Security

    Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: Comforte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • How long does it take to get owned?

    Sponsored by: ComputerWeekly.com

    A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.

  • How to Combat Fraud in 3 Easy Steps

    Sponsored by: Onfido

    There are countless ways fraudsters can slip through the net. That's why organizations need to be able to recognize and analyze all of them to keep ahead competitively. Download this white paper for 3 simple steps to combat identity fraud today.

  • Norton Cyber Security Insights Report

    Sponsored by: ComputerWeekly.com

    This report examines consumers' online behaviours, attitudes and security habits alongside the dangers and financial cost of cyber crime

  • The identity perimeter

    Sponsored by: ComputerWeekly.com

    Analysts Bob Tarzey and Rob Bamforth, make the case for identity management and advanced single-sign-on (SSO) to help businesses and their customers and partners work in a more integrated way.

  • Underexposed risks of public Wi-Fi hotspots

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.

  • The Deloitte Consumer Review: A more secure customer

    Sponsored by: ComputerWeekly.com

    This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.

  • Mobile Security Strategies

    Sponsored by: ComputerWeekly.com

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • What to Look for in Web Fraud Detection Systems

    Sponsored by: SearchSecurity.com

    In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.

  • 5 Steps to Raising Ransomware Resistance

    Sponsored by: SearchSecurity.com

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Time for an IAM Overhaul

    Sponsored by: SearchSecurity.com

    IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.

  • Information Security Asean November 2015

    Sponsored by: TechTarget ANZ

    The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it

  • Information Security ASEAN March 2015

    Sponsored by: SearchSecurity.com

    Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.

  • Information Security ANZ March 2015

    Sponsored by: SearchSecurity.com

    Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.

  • What to Look for in Web Application Firewall Products

    Sponsored by: SearchSecurity.com

    In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.

  • Information Security ANZ November

    Sponsored by: SearchSecurity.com

    In this expert e-zine, learn how industry leaders like Symantec, CSC and BAE Systems are expanding Australian facilities and working to stake their claim in the face of rising threats and a diminishing skills-base. Additionally, learn about operational challenges as cyber security gets "censored" and how open source security needs serious help.

  • Internet-Scale Identity Systems:An Overview and Comparison

    Sponsored by: Ping Identity Corporation

    This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.