ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Research

  • PCI Council issues mobile application rules for software developers

    Sponsored by: SearchSecurity.com

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: SearchSecurity.com

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Infosec 2012: How to Help Your Organisation Deal with Next-Generation Cyber-Attacks

    Sponsored by: SearchSecurity.com

    This E-Guide offers expert insight on how to address next-generation cyber-attacks. View now to learn how network visibility can help you mitigate advanced threats, and much more!

  • Six Email Security Best Practices for Email SaaS

    Sponsored by: SearchSecurity.com

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

  • Discover the Risks and Rewards Behind a Mobile Workforce

    Sponsored by: SearchSecurity.com

    Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

  • Enabling the secure use of RFID

    Sponsored by: ComputerWeekly.com

    Dario Bevilacqua and Keith Mayes  describe the design of an UHF RFID system for secure identification and tracking.

  • Information security trends

    Sponsored by: ComputerWeekly.com

    This report from CompTIA, based on original research, assesses the current trends in information security.

  • SIEM IT Decision Center- Checklist #1

    Sponsored by: SearchSecurity.com

    If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.

  • ISM Essentials Guide – Threat Management

    Sponsored by: SearchSecurity.com

    In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.

  • Information Security Magazine - May 2012

    Sponsored by: SearchSecurity.com

    Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.

  • April Essential Guide to Data Protection

    Sponsored by: SearchSecurity.com

    In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.

  • CIO Handbook: The Risk Management Approach to Information Governance

    Sponsored by: SearchCompliance.com

    This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.

  • Security in the Age of Mobility

    Sponsored by: Trend Micro

    This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.

  • Go Daddy Sets a New Standard for SecureOnline Experiences

    Sponsored by: Trend Micro

    As a top web hosting company, Go Daddy has a big responsibility to its more than 9 million customers to provide comprehensive data security from today's threats. Read on to find out how Go Daddy was able to improve protection and ensure fast, flexible response to ever-changing threats with low total cost of ownership.

  • Application Visibility and Control

    Sponsored by: Aerohive Networks

    Read on to discover a way you can visualize, monitor and manage your edge network infrastructure, and learn how to keep track of when and where users are attempting to access your network and how it is being used.

  • Information Security Magazine - April 2013

    Sponsored by: SearchSecurity.com

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  • Network Security Technologies Technical Guide

    Sponsored by: SearchSecurity.com

    Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.

  • Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them

    Sponsored by: eIQnetworks

    This valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.

  • The path to securing your mobile Enterprise

    Sponsored by: Juniper Networks, Inc.

    This presentation transcript highlights the rise in mobile popularity, emerging security threats and how people are handling them. Discover more about IT architectures for mobile devices and how you can further develop a mobile workplace.

  • Compliance Driven Security

    Sponsored by: DellEMC and Intel®

    With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.

  • Compliance strategies for greater cyber security policies

    Sponsored by: HP Enterprise Security

    Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.

  • The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats'

    Sponsored by: EMC Corporation

    In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security.

  • Business Oriented Information Architecture

    Sponsored by: Sybase, an SAP company

    This paper outlines an information architecture (IA) and why it is useful in determining everything from the robustness of IT projects to testing business process scenarios to see if they satisfy the wide-ranging needs of your business. Read this now to learn more about IA, including its basic design, how to start your program and more.

  • Storage Data Protection Strategies In Today’s Data Center

    Sponsored by: Oracle Corporation

    An increasing number of organizations are looking at how choosing the right storage platforms contributes to data protection and high-availability and helps ensure minimal planned and unplanned downtime or even continuous operations. Read this white paper to learn all about data protection and how it applies to your business.

  • Killing Data

    Sponsored by: Voltage Security, Inc.

    Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.