ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • QRadar: Expert SIEM Product Overview

    Sponsored by: IBM

    Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.

  • Cybersecurity skills shortage demands new workforce strategies

    Sponsored by: IBM

    The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.

  • Mobile Data Security Threats: Hype vs. Reality

    Sponsored by: Lookout

    As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.

  • Office 365: Cloud Data Security Considerations to Explore Before Adopting

    Sponsored by: Proofpoint

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • Removing Malware and Undetectable Windows AppLocker

    Sponsored by: Check Point Software Technologies Ltd.

    A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.

  • What Healthcare Executives Must Know About Data Breaches

    Sponsored by: Coalfire

    BYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.

  • Computer Weekly – 10 May 2016: Graph databases are making connections

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the recent Panama Papers scandal relied on graph databases to uncover secrets from huge volumes of data – we look at the business benefits of the technology. Most organisations are failing to take basic IT security measures – we examine why. And we analyse the latest flash storage innovations. Read the issue now.

  • Recognize Your Security Shortcomings and Address Them with Confidence

    Sponsored by: Dell, Inc. and Intel®

    This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.

  • It's time to tackle IoT security

    Sponsored by: Ruckus Wireless

    The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.

  • How can proper BYOD and IoT device onboarding improve

    Sponsored by: Ruckus Wireless

    This e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.

  • Tips to Secure your Virtualized Data Center

    Sponsored by: TechData - Kaspersky

    This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.

  • The Benefits of Investment in Threat Detection

    Sponsored by: ThreatConnect

    This e-guide shows you the value of advanced threat intelligence and why you shouldn't skimp when it comes to protecting your organization's valuable data. Access now for examples from various IT companies about how they justify spending money without seeing a tangible ROI.

  • Third-Party Risk Management: Evaluating and Contracting with Vendors

    Sponsored by: BitSight

    This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.

  • Yield Insight into Your Business Info with Data-Aware Storage

    Sponsored by: DataGravity

    This expert guide discusses advanced "data-aware" storage infrastructure with big data processing capabilities and efficient metadata management. Learn how this infrastructure can provide your enterprise with intelligent, fast, and highly efficient data services that enables greater insight into your stored data.

  • The Evolution of Network Security Hardware

    Sponsored by: Aruba Networks

    This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.

  • Securing Your Network in the Wireless Age

    Sponsored by: Aruba Networks

    In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.

  • Deeper Threats Call for Advanced Threat Detection

    Sponsored by: Solarwinds MSP

    Access this e-guide and discover the necessity of having multiple layers of security and employing multiple technologies in the process. Antivirus technologies are fine for a first measure, but finding advanced threats requires deeper network scans.

  • Compliance Standards for Data Governance

    Sponsored by: Smarsh

    This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.

  • Prevent unauthorized database access with TDE

    Sponsored by: Oracle Corporation

    This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.

  • How an Identity Management System can Improve Mobile Security

    Sponsored by: Oracle Corporation

    This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.

  • The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data

    Sponsored by: UnitedLex

    Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.

  • The Problem Facing Advanced Threat Defense

    Sponsored by: UnitedLex

    The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.

  • Advanced Persistent Threat Detection: Can It Find Custom Malware?

    Sponsored by: UnitedLex

    A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: UnitedLex

    While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.