ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Audits Research

  • The Top Industries at Risk for Cyber Attacks

    Sponsored by: Barracuda

    This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.

  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

    Sponsored by: Barracuda

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

  • Understanding and Preventing Finance Phishing Fraud

    Sponsored by: Barracuda

    Today's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.

  • Protecting IIoT Devices from Ransomware and Botnet Infections at Scale

    Sponsored by: Barracuda Networks

    To achieve multi-tiered secure access and cloud scalable security for IIoT devices, read this sheet. It provides you an overview of a secure access controller built for dispersed devices and environments.

  • Keeping Users Safe from Advanced Threats and Unsolicited Content

    Sponsored by: Barracuda Networks

    How can you stop advanced malware from breaching your network perimeter and stealing your valuable data? The following paper explains how to confront—and thwart—these threats using a cloud-based firewall that combines multiple layers of detection for all threat vectors with on-the-fly sandbox execution of unknown files.

  • FineLine Technologies Secures Its Multi-location Network with Barracuda

    Sponsored by: Barracuda Networks

    FineLine Technologies struggled to find a robust firewall system that could be easily deployed across their global offices. This case study covers FineLine's journey and demonstrates how they found a firewall that could secure data across their globally dispersed network.

  • Overview of Barracuda Advanced Threat Protection

    Sponsored by: Barracuda Networks

    The following white paper highlights a multi-layer advanced threat protection approach designed to defend against all threat vectors and across multiple deployment surfaces. Read on to see how your organization could benefit from this four-layered approach.

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • Revisiting Public Cloud Security

    Sponsored by: Barracuda

    From a survey of 300 ITDMs, this report digs into the benefits and challenges of the public cloud and revisits several strategies to strengthen security. Read on to ensure your organization's public cloud security posture is in good standing.

  • Automate Compliance Audits Without the Staff

    Sponsored by: Data Theorem

    Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • Gain Security Visibility and Strengthen HIPAA Compliance with the AWN CyberSOC Service

    Sponsored by: Arctic Wolf

    Download this case study to learn why Bethesda Health Group chose to implement Arctic Wolf's AWN CyberSOC to protect their network, while helping them reach their HIPAA compliance goals and prevent cyberattacks.

  • Mobile security moving to a unified approach

    Sponsored by: ComputerWeekly.com

    This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

  • How the Hybrid Cloud Changes the Game for Security

    Sponsored by: Trend Micro, Inc.

    Discover how to secure today's servers by examining the dynamics of the hybrid cloud and the challenges introduced at both the business and technical levels.

  • What GDPR privacy requirements mean for U.S. businesses

    Sponsored by: SearchSecurity.com

    Enforcement of the EU's new GDPR privacy regulations is imminent, and potential fines send a clear message to companies to protect their customers, or else.

  • Six Criteria for Buying Data Loss Prevention Products

    Sponsored by: InteliSecure

    Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.

  • Introduction to Data Loss Prevention Tools

    Sponsored by: InteliSecure

    In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.

  • Your Guide to Combatting Ransomware's Domination of 2017

    Sponsored by: CyberArk Software, Inc

    Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.

  • SSL: Get the Best for You and Mitigate Vulnerabilities

    Sponsored by: A10 Networks

    Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.

  • Your IIoT Security Plan: Risks in Manufacturing

    Sponsored by: Bayshore Networks

    In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.