ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Research

  • April Essential Guide to Data Protection

    Sponsored by: TechTarget Security

    In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.

  • E-Guide: Identifying and addressing evolving threats

    Sponsored by: TechTarget Security

    This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.

  • E-Guide: Steps to securing your file transfers and meeting compliance requirements

    Sponsored by: TechTarget Security

    Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.

  • How to create an effective data protection strategy for IT compliance

    Sponsored by: TechTarget Security

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

  • The various ways to fight new and emerging cybercrime

    Sponsored by: TechTarget Security

    Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.

  • An effective mobile device security policy

    Sponsored by: TechTarget Security

    Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.

  • Creating a Compliance Culture: Best Practices

    Sponsored by: TechTarget Security

    Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.

  • Data Protection 101: Essential Steps for Holistic Information Security

    Sponsored by: TechTarget Security

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

  • E-Guide: Remediating IT vulnerabilities: Expert Tips

    Sponsored by: TechTarget Security

    This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.

  • The path to securing your mobile Enterprise

    Sponsored by: Juniper Networks, Inc.

    This presentation transcript highlights the rise in mobile popularity, emerging security threats and how people are handling them. Discover more about IT architectures for mobile devices and how you can further develop a mobile workplace.

  • Compliance Driven Security

    Sponsored by: DellEMC and Intel®

    With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.

  • Compliance strategies for greater cyber security policies

    Sponsored by: HP Enterprise Security

    Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.

  • The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats'

    Sponsored by: EMC Corporation

    In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security.

  • Business Oriented Information Architecture

    Sponsored by: Sybase, an SAP company

    This paper outlines an information architecture (IA) and why it is useful in determining everything from the robustness of IT projects to testing business process scenarios to see if they satisfy the wide-ranging needs of your business. Read this now to learn more about IA, including its basic design, how to start your program and more.

  • Storage Data Protection Strategies In Today’s Data Center

    Sponsored by: Oracle Corporation

    An increasing number of organizations are looking at how choosing the right storage platforms contributes to data protection and high-availability and helps ensure minimal planned and unplanned downtime or even continuous operations. Read this white paper to learn all about data protection and how it applies to your business.

  • Killing Data

    Sponsored by: Voltage Security, Inc.

    Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.

  • Information Governance: Audit and Protection on the IBM System z Platform

    Sponsored by: IBM

    Over the last few years, organizations have realized that their ability to manage their business, remain compliant and mitigate risk will be compromised without 'rock solid' data. Read this white paper to discover the importance of protecting your enterprise information through proper management measures.

  • Balancing compliance with information security threat assessment

    Sponsored by: IBM

    This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.

  • Sharpening the focus on mainframe security

    Sponsored by: IBM

    Data breaches are becoming more common, with hackers targeting confidential information, causing losses in profitability, customer confidence and competitive advantage. As a result, mainframe security is under more scrutiny than ever before. Access this tip guide for steps every company can take to ensure the security of their most valuable data.

  • Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now.

  • Layered Security: Protecting Your Data in Today's Threat Landscape

    Sponsored by: Tripwire, Inc.

    In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.

  • Building Your Business Case for Managed File Transfer

    Sponsored by: OpenText

    The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing.

  • Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.

  • Governance and control: Focus risk management on multiple levers of control

    Sponsored by: IBM

    Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.

  • HP ArcSight Express 3.0

    Sponsored by: HP Enterprise Security.

    View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.