ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • 4 Key Elements Of An ML-Powered NGFW: How Machine Learning Is Disrupting Network Security

    Sponsored by: Palo Alto Networks

    Bad actors and security teams are trading blows when it comes to leveraging automation, with both sides scaling their operations. But as more and more organizations leverage cloud, environments become more complex and more vulnerable. Delve into this white paper to learn how machine learning (ML) can aid in securing your network.

  • Iot Security For Healthcare

    Sponsored by: Palo Alto Networks

    Learn about an IoT Security service that allows you to prevent threats and control the risk of IoMT, IoT, and IT devices on your network across all sites.

  • SIG - How Maryland's leading healthcare provider has adopted a SASE approach to improve security and build patient trust with Cisco Umbrella

    Sponsored by: Cisco Umbrella

    Frederick Health needed a secure and efficient solution at the cloud edge that could provide granular controls for users no matter where they connect from. Frederick Health turned to Cisco to provide a SASE architecture and deployed DNS-layer security, secure web gateway and firewall functionality from Cisco Umbrella.

  • DNS - The Top Six Network Security Pitfalls

    Sponsored by: Cisco Umbrella

    Trying to get ahead by staying behind a firewall won’t work in 2021. A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common network security pitfalls that put your users, their devices, and your data at risk.

  • SIG - SASE in 15 minutes

    Sponsored by: Cisco Umbrella

    Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.

  • Internal Firewalls

    Sponsored by: VMware

    Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.

  • Learning a New Approach to Teaching in the Education Sector

    Sponsored by: Shure Inc

    Educators and students have been significantly impacted by the spread of COVID-19. While most classes are remote, hybrid learning models are also an option – either way the focus remains on providing students and teachers with a safe, socially-distant but effective curriculum. Read this article to learn more about these changes.

  • Better Together: Prisma Access And Cloudgenix SD-WAN

    Sponsored by: Palo Alto Networks

    In this brief, learn how CloudGenix SD-WAN and Prisma Access have joined together to deliver hybrid applications to branch offices over any network while providing consistent, cloud-delivered security.

  • Is the SD-WAN home office here to stay?

    Sponsored by: SearchNetworking.com

    While VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.

  • Computer Weekly – 15 December 2020: How security will be different after Covid-19

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.

  • What to include in an SD-WAN security checklist

    Sponsored by: Silver Peak

    SD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.

  • Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.

  • Cybersecurity: It's a Team Sport

    Sponsored by: WhiteHat Security

    During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.

  • Detecting and Defending Against SSRF

    Sponsored by: WhiteHat Security

    Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.

  • IT's 5 Toughest Work From Home Challenges and How to Solve Them

    Sponsored by: Aruba Networks

    2020 has forced many organisations to shift to a hybrid work model. Although this helped employees save time on their commutes, it has led to a number of network security challenges. In this e-book, explore the 5 biggest challenges IT teams are facing and learn how Aruba can help you get ahead of them.

  • Hoe to Terminate Your MPLS Contract Early

    Sponsored by: Cato Networks

    In this e-book, dive into the nitty gritty of MPLS contracts and uncover tips, steps, and an overall strategy you can use to transition from MPLS to newer, more affordable, agile WAN alternatives without break the bank.

  • TEI Spotlight Report Shows SD-WAN Customers' Results

    Sponsored by: Palo Alto Networks

    For this TEI Spotlight report, Forrester Research interviewed 9 key stakeholders at different companies and surveyed a further 133 organizations with experience using Palo Alto Networks CloudGenix SD-WAN. Then, Forrester combined the results into a "composite organization" and ran a three-year financial analysis. Read the report today.

  • Dually Deceptive: Two New Phishing Scams Swimming by Your SEG

    Sponsored by: Inky Technology

    Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.

  • Zoom & Doom: How INKY Unraveled A Credential Harvesting Phishing Scam

    Sponsored by: Inky Technology

    Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.

  • CEO Impersonation

    Sponsored by: Inky Technology

    Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.

  • Around the World in 34 Phish: Covid-19 Phishing Examples

    Sponsored by: Inky Technology

    The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.

  • Exploiting a Pandemic White House COVID-19 Phishing Scams

    Sponsored by: Inky Technology

    It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

  • GoSecure Cybersecurity Perceptions Versus Reality

    Sponsored by: GoSecure

    This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.

  • Can a zero-trust approach fill the security perimeter void?

    Sponsored by: SearchSecurity.com

    Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.