ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Research

  • 5 Ways CIOs Can Optimize Communication With Other Executives

    Sponsored by: BitSight

    Despite the fundamental importance of information technology and security, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.

  • Cybersecurity Benchmarking & Security Performance Management

    Sponsored by: BitSight

    A new, data-driven security performance management approach is required to maintain security, minimize risk, and reduce costs. The key component of this new data-driven approach is the security rating. In this white paper, explore how the approach can be applied to security performance management, benchmarking and reporting.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • April ezine: SD-WAN more than just networking

    Sponsored by: MicroScope

    An issue covering SD-WAN, storage innovations and opportunities for channel growth

  • Incident response playbook in flux as services, tools arrive

    Sponsored by: SearchSecurity.com

    The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.

  • DIY is DOA: Cybersecurity Moves Toward Hybrid Models

    Sponsored by: Dell SecureWorks

    Information security always was complex and challenging. But the rise of cloud and mobile organizations has multiplied that challenge. However, information security services providers (ISSPs) can help organizations by empowering their internal resources. In this white paper, explore how using ISSPs can leverage an organization's operations.

  • Implementing Agile Security Response

    Sponsored by: ServiceNow

    Data breaches constantly threaten enterprises today. The biggest challenge that organizations face is coordinating incident response across the organization. Download this resource for access to an essential security operations solution checklist to help your organization better respond to security threats and vulnerabilities.

  • December ezine: Tech for good

    Sponsored by: MicroScope

    Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same

  • September ezine: Thinking digital in the world of storage

    Sponsored by: MicroScope

    The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry

  • Recent Ransomware Attacks Got you? Don't Cry; Fight Back!

    Sponsored by: SearchSecurity.com

    Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.

  • Get Smart About Threat Intel Tools and Services

    Sponsored by: SearchSecurity.com

    Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.

  • The difficulties of defending against web tracking

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.

  • LogRhythm '2018 Cybersecurity Perceptions and Practices Benchmark Survey'

    Sponsored by: LogRhythm, Inc.

    Find out why security teams need to be working more intentionally to take time to understand the full scope of an incident and determine how to best neutralize it.

  • 8 Cloud Security Certifications That Can Boost Your Career

    Sponsored by: TechTarget

    Obtaining a cloud security certification can translate to better career opportunities. But, determining which certifications to pursue can be challenging. Participate in our Cloud Security Survey to unlock our exclusive guide, Cloud Security Certifications 101. In this guide, explore which certification will best demonstrate your skillset.

  • The Top Cyber Security Trends in ANZ in 2017

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.

  • MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate

    Sponsored by: MicroScope

    An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.

  • Crafting an Insider Threat Program: Why and How

    Sponsored by: SearchSecurity.com

    Tackling IT threats is even harder when the breach -- malicious or inadvertent -- originates in the company. Learn how to handle insider threats.

  • MicroScope E-Zine: January 2017

    Sponsored by: MicroScope

    Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.

  • Facing up to emerging technology: Risks and benefits

    Sponsored by: SearchCIO

    Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.

  • ITSM strategy for an agile, secure digital transformation

    Sponsored by: SearchCIO.com

    As digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    Sponsored by: SearchSecurity.com

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

  • Build your Content Security and Document Management Plan

    Sponsored by: Adobe Inc

    In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.

  • Get Smart About Threat Intel Tools and Services

    Sponsored by: SearchSecurity.com

    Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.

  • Secure Information Exchange in the Digital Age

    Sponsored by: OpenText

    Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.

  • Judging MSSP Options With Care

    Sponsored by: SearchSecurity.com

    The managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.