ComputerWeekly.com Research Library

Powered by Bitpipe.com

Pretty Good Privacy Research

  • 10 Best Practices for Internet Security

    Sponsored by: Verizon

    Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.

  • 10 Endpoint Security Problems and How the Cloud Solves Them

    Sponsored by: VMware International Unlimited Company

    In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.

  • 10 Ways to Secure and Accelerate a Modern Workforce

    Sponsored by: Cloudflare

    As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.

  • 100 Days of Coronavirus (COVID-19)

    Sponsored by: Mimecast

    To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.

  • 12 Reasons Why You Need Stronger Mobile App Security

    Sponsored by: NowSecure

    Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.

  • 12 Things You Should Do to Stop Ransomware

    Sponsored by: ThreatLocker

    To help organizations address some of the commonly overlooked practices (or lack thereof) that can better detect and mitigate ransomware attacks, ThreatLocker compiled a list of practices that highlights 12 things your organization should be doing to stop ransomware attacks. Download now to unlock these 12 necessary practices.

  • 13 Email Threat Types to Know about Right Now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • 2017 IT Priorities in the Middle East

    Sponsored by: ComputerWeekly.com

    Benchmark your IT spending plans with our in-depth study of IT spending priorities in the Middle East.

  • 2019 Cloud Trends Report

    Sponsored by: Skybox Security

    As organizations continue to embrace the benefits of cloud technologies, they must also be mindful of the additional threats and vulnerabilities that can occur as a result of their transformation. In this report, analyze key trends and challenges related to cloud tools, infrastructures and security across 2019.

  • 2019 CrowdStrike Global Security Attitude Survey

    Sponsored by: CrowdStrike

    Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.

  • 2019 Proofpoint Domain Fraud Report

    Sponsored by: Proofpoint

    Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.

  • 2020 Cybersecurity Outlook Report

    Sponsored by: VMware International Unlimited Company

    The fight between organizations trying to secure their data and cyberattackers looking for ways to steal it is a constant struggle that seems to constantly evolve. As organizations employ stronger defenses, hackers find more creative ways to bypass them. In this research report, uncover the findings from a study into the evolution of this pattern.

  • 2020 Data Breach Executive Brief

    Sponsored by: Verizon

    Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Download this executive brief to unlock this year’s findings.

  • 2020 Data Breach Investigations Report

    Sponsored by: Verizon

    Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Read on to unlock the complete 119-page report overviewing this year’s findings.

  • 2020 Global Threat Report

    Sponsored by: Crowdstrike

    Each year, the CrowdStrike Intelligence team releases a report of their findings from looking into cyberattack trends and emerging adversaries over the previous year. This year’s report examines key trends in ransomware and eCrime as well as an overview of state-sponsored adversaries and their suspected motives.

  • 2020 Remote Workforce Cybersecurity Guide

    Sponsored by: Automox

    The sudden and dramatic fashion in which organizations had to enable nearly their entire workforce to operate remotely has brought about a new set of security challenges that need to be addressed. Download this white paper to explore these new threats and discover how to address them without increasing cost or complexity.

  • 2020 SonicWall Cyber Threat Report

    Sponsored by: SonicWall

    Each year is a constant struggle between cybercriminals attempting to conduct successful attacks and organizations defending their users and data. 2019 was a good year for organizations as malware attacks dropped by 6%. Read on to uncover key statistics and insights about last year’s cyberattack trends.

  • 2020 State of Enterprise Cloud Adoption and Security

    Sponsored by: DivvyCloud

    Cloud usage has been growing steadily over recent years, and that trend is expected to continue. However, misconfigurations and data breaches have led to security concerns. This report highlights the findings from a 2019 study into enterprise cloud adoption as well as security and compliance challenges. Read on to uncover the results.

  • 2020 State of Malware Report

    Sponsored by: Malwarebytes

    Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.

  • 2020 Trustwave Global Security Report

    Sponsored by: SingTel

    This annual Trustwave Global Security Report provides a comprehensive look at the methods and techniques used by cybercriminals in order to provide valuable insight into ever-changing threat landscape. Download this report for an in-depth analysis of data compromise, email threats, malware, network security and more.

  • 2020 Vulnerability and Threat Trends

    Sponsored by: Skybox Security

    Enterprise growth is a double-edged sword – the more complex and distributed a business environment becomes, the larger the attack surface becomes. In this report, explore vulnerability and threat trends across 2020, including emerging threat vectors, disruptive attack methods, vulnerable operating systems, and more.

  • 10 Steps to Email Security

    Sponsored by: Clearswift

    This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.

  • 10 Ways You Can Improve Web App Performance

    Sponsored by: SOASTA, Inc

    This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.

  • 2013 North American Software Defined Data Center Management Platforms New Product Innovation Award

    Sponsored by: HPE and Intel®

    Take a look at this in-depth resource to find out why HP received a "New Product Innovation Award" for their software defined data center management platforms.

  • 3 CIO Essentials: Top Trends To Help Your Business

    Sponsored by: MuleSoft

    This one-stop-shop for CIOs discusses the 3 most important trends companies can capitalize on to help future success. Access this webinar now for an in-depth look into essential topics.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.