ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Research

  • Vendor Research Report for IT Risk Management

    Sponsored by: MetricStream

    By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.

  • The 2020 Trust Report: eCommerce and Retail Executive Summary

    Sponsored by: Synack

    This 2020 Trust Report 1-Page Executive Summary allows you to quickly benchmark your organization’s security against others in eCommerce and Retail. You’ll also learn how organizations that adopt this one testing strategy harden their assets by 23%.

  • Navy Federal Credit Union on Security During Crisis

    Sponsored by: Synack

    Leading an organization or a team during the COVID-19 pandemic is a challenge regardless of title. However, the CISO is uniquely armed with the skills to respond, manage and lead a team during crisis. In this podcast, hear from the CISO of Navy Federal Credit Union as he shares his methods for building trust and maintaining business as usual.

  • Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security

    Sponsored by: Atakama

    The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.

  • The Guide to Managing the Security of your SaaS and Cloud Providers

    Sponsored by: Panorays

    The rapid increase in cloud app usage has opened a massive threat vector. In fact, 59% of organizations have experienced a data breach caused by a third-party. Add a growing list of new regulations to the equation and management becomes a virtual nightmare. Leverage this webinar to learn how to improve your cloud security program.

  • How to Elevate Your Threat Intelligence Program

    Sponsored by: DomainTools

    According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.

  • How to Identify Threats Faster and Increase Productivity

    Sponsored by: DomainTools

    With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.

  • Data Discovery and Classification: The Foundation of Effective Information Governance

    Sponsored by: HelpSystems

    With the right technology tools, a data discovery and classification exercise will enable an enterprise to find its sensitive data, label it with the appropriate sensitivity and ensure that you can demonstrate regulatory compliance. View this white paper to learn why organizations should take a joint approach to tackling big data.

  • How to Level Up Your Vendor Management

    Sponsored by: Aptible

    Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.

  • Automate Data Security

    Sponsored by: Red Hat

    Financial services firms must comply with a range of increasingly strict security and privacy standards. However, using joint solutions can take a DevSecComplianceOps approach to automate application building, testing, and deployment. View this white paper to learn more.

  • Attacking and Defending a Distributed Workforce

    Sponsored by: ServiceNow

    The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.

  • Risk Management Best Practices for Privileged Access Management (PAM)

    Sponsored by: Quest

    Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.

  • Hitachi ID Bravura Discover

    Sponsored by: Hitachi ID

    In the age of ransomware attack, your organization needs to proactively control identity and privileged access security, and it needs risk insight while maintaining scalability. View this Hitatchi ID Bravura Discover data sheet to learn about an approach to IAM and PAM that strives to identify hidden risks and scale with growing threats.

  • Build Resilience for Your Business in the New/Next Normal into 2021 and Beyond

    Sponsored by: ServiceNow

    In this new normal, most companies don't have a complete picture of what's happening in various parts of their business. To stay ahead of risks and plan for recovery means having visibility and control, and the right software can help you achieve both. Watch this video to learn about Business Continuity Management from ServiceNow.

  • What Every Security Professional Should Know About Third-Party OAuth Apps

    Sponsored by: Proofpoint

    For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.

  • Cybereason MDR Packages

    Sponsored by: Cybereason

    Detection and response are vital to any organization’s security. With managed detection and response (MDR), you can efficiently prevent data breaches, eliminate false positives, and because it’s managed, you can optimize security operations and reduce total cost of ownership. Dive into this data sheet to learn about MDR from Cybereason.

  • Simplify Your Security Operations Center

    Sponsored by: Red Hat

    77% of organizations plan to implement automation to speed up security response times. Does yours? Dive into this e-book to learn about the benefits of an automation platform and how you can simplify your security operations center.

  • False cents of security: The price of being compromised

    Sponsored by: ComputerWeekly.com

    Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • April ezine: SD-WAN more than just networking

    Sponsored by: MicroScope

    An issue covering SD-WAN, storage innovations and opportunities for channel growth

  • Ransomware Backup Protection Requires Comprehensive Approach

    Sponsored by: SearchDataBackup.com

    Read on to discover just how ransomware can infiltrate data backups, what organizations can do to best prepare for this new problem and general guidelines for better backup practices.

  • Employ AI for Cybersecurity, Reap Strong Defenses Faster

    Sponsored by: SearchSecurity.com

    Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

  • Facing up to emerging technology: Risks and benefits

    Sponsored by: SearchCIO

    Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.

  • Incident response playbook in flux as services, tools arrive

    Sponsored by: SearchSecurity.com

    The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.