ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft Research

  • Important Things You Need to Know about Storing Your Identity

    Sponsored by: RSA Conference

    Where do you store your credentials? It's important to know, since technological weaknesses in credential security and misused actions within the operating system can be greatly detrimental to the storage of your credentials. In this session from RSA Conference, learn how to prevent the many technological weaknesses in credential security.

  • Winning the Battle Over Passwords

    Sponsored by: OneLogin

    Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.

  • Can Cryptography Save Our Elections

    Sponsored by: RSA Conference

    Microsoft's recent unveiling of open source ElectionGuard is the latest response to an increasingly urgent question: How secure are our elections? And if it can lock down votes, then what else is cryptography capable of? Download this podcast transcript to learn more about cryptography's expanding role in cybersecurity.

  • Understand How SSO and MFA Improve Security

    Sponsored by: OneLogin

    IT departments are in a tough spot when it comes to security. The most common attacks are aimed at obtaining user credentials, with the password being the critical element. In this white paper, learn why secure SSO and risk-aware MFA are the golden keys to protecting your organization's sensitive information.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    Learn about the most dangerous new attack techniques in this follow-up to the popular RSA Conference 2019 SANS Institute keynote panel. See how these new threats work, what's coming next, and the best ways to bolster your defense against them. Watch now.

  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Sponsored by: Menlo Security

    Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.

  • Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization

    Sponsored by: FairWarning

    1 in 3 data breaches involve internal actors, according to the Verizon Data Breach Investigation Report 2019. There are many different insider threat profiles that have varying intentions. In this ebook, explore 5 of these profiles and learn how to protect your organization from each.

  • Deliver a Secure Digital Workspace with Next-Gen Remote Access Solutions

    Sponsored by: Citrix

    Digital transformation is the rocket fuel that helps companies boost productivity, engage consumers, and empower their people. However, the new application infrastructure is also posing new workflow challenges and security risks. In this white paper, learn how a secure digital perimeter enables IT to combat these security risks.

  • Doing Identity Access Right

    Sponsored by: HelpSystems

    In a world of corporate hacks and ransomware, keeping your data under digital lock and key is essential. But so is allowing your employees to use it to do their best work. In this white paper, explore common access risks and how Identity Governance and Administration (IGA) can help your organization combat these risks.

  • Intelligent Identity And Access Management

    Sponsored by: HelpSystems

    Providing Identity and Access Management (IAM) is a huge task; therefore, organizations are likely to face many challenges. Unfortunately, the environments that IAM systems support are often subject to attacks. In this white paper, learn how to leverage Intelligent IAM to help keep your organization's identity and accounts safe and secure.

  • Securing Transportation Infrastructure

    Sponsored by: Cyber-Ark Software

    Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.

  • Where Security Accountability Stops and Starts In the Public Cloud

    Sponsored by: Cyber-Ark Software

    Whether in the cloud or on-premises, credentials are vital to secure and manage. It is especially important to protect privileged credentials because they allow the escalation of privileges within the cloud infrastructure. In this white paper, learn why a privileged access security strategy is key to protecting critical data in the cloud.

  • The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications

    Sponsored by: Cyber-Ark Software

    The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.

  • Why Biometric Verification is Key to Proving Digital Identity

    Sponsored by: Onfido

    Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.

  • Securing the Grid Why Privileged Access Security is Key to Protecting Critical Energy & Utilities Infrastructure

    Sponsored by: Cyber-Ark Software

    One of the largest security vulnerabilities faced by companies in the energy and utilities sector is privileged accounts, and the access they provide. In this white paper, learn how energy and utilities organizations can proactively reduce the risk posed by privileged access.

  • Retail & Ecommerce: Securing Your Brand and Locking in Consumer Confidence

    Sponsored by: Cyber-Ark Software

    The retail marketplace sector is facing a perfect storm of vulnerabilities. To address these vulnerabilities, organizations should implement an effective privileged access security strategy. In this white paper, learn how to create an action plan that can help your retail organization secure their privileged accounts and credentials.

  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse in Salesforce

    Sponsored by: FairWarning

    Privileged Salesforce users are necessary to every organization however, with the ability to make nearly unlimited changes; they place your organization at tremendous risk. In this white paper, explore 4 best practices for preventing privileged user abuse in Salesforce.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • How to Improve Your Mobile Authentication Practices

    Sponsored by: Onfido

    The most common mobile authentication methods include a variety of risks which could leave your mobile devices open for hackers to roam freely. In this e-guide learn why a strong mobile authentication strategy should include a biometric factor, and why IT should consider implementing a multifactor authentication process.

  • Key Considerations For Implementing an IAM System

    Sponsored by: Onfido

    IT administrators have many features to choose from and requirements to meet when looking for an identity and access management (IAM) tool. In this e-guide, explore other key considerations for selecting and implementing the right IAM system in your organizations.

  • Evaluating Identity Verification Solutions

    Sponsored by: Onfido

    When evaluating an identity and access management system, there are many criteria to look out for. Download this interactive checklist to help you.

  • Fighting Fraud —the Future of Digital Onboarding

    Sponsored by: Onfido

    Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Read on to learn how your organization can implement identity best practices without adding friction to any digital onboarding experience.

  • 9 Common Security Mistakes Your Organization Might Be Making

    Sponsored by: Involta

    Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: Comforte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • Insider Threat Report Executive Summary

    Sponsored by: Verizon

    Since insider threats have few barriers to overcome, it can take months or years for the threat to be discovered. Therefore, rogue partners, careless contractors and negligent (or malicious) employees can seriously disrupt your organization. In Verizon's Insider Threat Report, learn more about insider threats and how to prevent them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.