Risk Management Research
-
Network Security: Spotlight on Australia/New Zealand
Sponsored by: ComputerWeekly.comIn this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
-
Computer Weekly – 30 January 2018: Davos debates global tech risks
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
-
6 Ways to Prevent Ransomware in Health IT
Sponsored by: Cisco UmbrellaWith so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
-
How to Make a SIEM System Comparison Before you Buy
Sponsored by: SearchSecurity.comConsidering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
-
ITSM strategy for an agile, secure digital transformation
Sponsored by: SearchCIO.comAs digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
-
Automation in Cybersecurity
Sponsored by: Juniper NetworksDuring his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.
-
The Security Benefits of DLP
Sponsored by: InteliSecureSecurity breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
-
The Right Track to GDPR Compliance
Sponsored by: Lynx Technology PartnersThe GDPR is creating a pivotal change in how organizations process personal data, and it's clear there are a few areas of misunderstanding surrounding the regulation. Explore this expert e-guide to get a better understanding of the GDPR.
-
The CIO's Guide to GDPR
Sponsored by: Lynx Technology PartnersThe key to GDPR is a sound approach to data protection across the organization. Access this e-guide to learn from security expert Ed Tucker about data protection preparedness in terms of the GDPR and other regulations.
-
How Prepared are Businesses for GDPR?
Sponsored by: Lynx Technology PartnersAccording to a recent poll of 900 business decision-makers, 31% believe their organization is GDPR compliant, however experts found that only 2% actually appeared compliant. Computer Weekly's security editor, Warwick Ashford dives into GDPR head first and reveals where businesses stand in their journey to GDPR compliance.
-
User Behavior Analysis & SIEM
Sponsored by: LogRhythm, Inc.In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
-
Endpoint Protection & Device Management
Sponsored by: SeqriteThe endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
-
The Security of Software Containers & Sandboxing
Sponsored by: CloudPassageSandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
-
Defense-In-Depth Security: Key to Keeping IT Safe
Sponsored by: SearchSecurity.comThe enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
-
How to update, automate your IR processes
Sponsored by: Booz Allen HamiltonIn the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
-
Buyer's Guide: Cybersecurity
Sponsored by: Palo Alto NetworksKeeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.
-
How Can Privileged Access Accounts Be Managed in Large Companies?
Sponsored by: One IdentityAccording to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
-
How can organizations get control over privileged identity management?
Sponsored by: One IdentityRecent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
-
Explore the latest enterprise mobile security technology
Sponsored by: SearchMobileComputingAs cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
-
PCI Compliance with Unified Security Management
Sponsored by: AT&T CybersecurityBecause organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
-
5 Steps to Implement & Maintain PCI DSS Compliance
Sponsored by: AT&T CybersecurityAchieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
-
What You SIEM is What You Get
Sponsored by: AT&T CybersecurityA properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
-
Threat Intelligence Evaluator's Guide
Sponsored by: AT&T CybersecurityOne of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
-
Encryption Hiding Malware in Half of Cyber Attacks
Sponsored by: A10 NetworksA Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
-
Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises
Sponsored by: A10 NetworksMost companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.