ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Disaster recovery and business continuity: Essential guide

    Sponsored by: ComputerWeekly.com

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

  • SIEM Analysis Interfaces for Security Professionals

    Sponsored by: LogRhythm, Inc.

    This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • What are Threat Intelligence Services?

    Sponsored by: Unisys

    To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.

  • DDoS Attacks Are On The Rise – And Fatal to Most Businesses

    Sponsored by: Arbor Networks

    This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.

  • Importance of Incident Response Collaboration

    Sponsored by: Dimension Data

    This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.

  • Protect Yourself From Antivirus

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Cloud Services Take Off, GRC Doesn't

    Sponsored by: SearchSecurity.com

    The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.

  • Former Healthcare CIO Talks Cybersecurity in Healthcare

    Sponsored by: Optum

    Gary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • If A Hacker Wants Your Data, Make Sure They Really Work For It

    Sponsored by: Carbon Black

    This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.

  • See Why Network Monitoring Tools are Critical in today's Hyperconnected World

    Sponsored by: eTECH Channel

    This e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.

  • BYOD and mHealth: Navigating Security and HIPAA

    Sponsored by: Optum

    BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.

  • Security Tips for HIPAA-Compliant Cloud Storage and Texting

    Sponsored by: Optum

    Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.

  • Understand the Hype around Mobile Data Security Threats

    Sponsored by: Check Point Software Technologies Ltd.

    In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.

  • Stop Future Threats though Careful Examination of the Malware Lifecycle

    Sponsored by: Check Point Software Technologies Ltd.

    This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.

  • Endpoint threat detection gets more response

    Sponsored by: Hewlett Packard Enterprise

    Discover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.

  • Best Practices for Monitoring Today's Murky Threat Environment

    Sponsored by: Hewlett Packard Enterprise

    In today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.

  • QRadar: Expert SIEM Product Overview

    Sponsored by: IBM

    Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.

  • Cybersecurity skills shortage demands new workforce strategies

    Sponsored by: IBM

    The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.

  • Mobile Data Security Threats: Hype vs. Reality

    Sponsored by: Lookout

    As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.

  • Office 365: Cloud Data Security Considerations to Explore Before Adopting

    Sponsored by: Proofpoint

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • Removing Malware and Undetectable Windows AppLocker

    Sponsored by: Check Point Software Technologies Ltd.

    A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.

  • What Healthcare Executives Must Know About Data Breaches

    Sponsored by: Coalfire

    BYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences