ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • How Does Security Innovation Power Digital Transformation?

    Sponsored by: ZeroNorth

    Digital transformation defined by its seeming-endless search for technological innovation. Unfortunately, security can sometimes be an afterthought for companies looking to stay ahead of the competition. In this white paper, discover how security innovation can augment digital transformation.

  • How to Collect and Use Internal Threat Intelligence

    Sponsored by: ThreatQuotient

    Traditionally, SIEM platforms have been the place where security teams correlate and collect logs from the network. The same goes for threat intelligence platforms. But the need to get all of your data in one place is more important than ever. Download this video demo to see how ThreatQ can do this.

  • How to Become Cyber Resilient: A Digital Enterprise Guide

    Sponsored by: Malwarebytes

    Tap into this white paper to explore the current market influences that impact how an organization pursues cyber resilience, the key methods that should be adopted in becoming cyber resilient, and the reasons why cyber resilience can transform an organization into a digital enterprise highly focused on growth.

  • Machine Learning for Effective Micro-Segmentation

    Sponsored by: ShieldX

    Learn how your organization could significantly improve security and decrease total cost of ownership with a micro-segmentation solution that employs machine learning.

  • Webinar: You Need Live Patching to Achieve SOC2 Compliance

    Sponsored by: CloudLinux

    In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.

  • CW Benelux February-April 2020: Ericsson helps driverless buses hit European streets

    Sponsored by: ComputerWeekly.com

    Ericsson reveals its plans for new technologies including 5G, the internet of things and automation, including driverless buses.

  • A CISO’s Guide to Micro-Segmentation

    Sponsored by: ShieldX

    Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. The following guide includes a comprehensive checklist designed to take the pain out of micro-segmentation adoption.

  • Implementing Effective Cyberprotection Demands New Approaches

    Sponsored by: NWN Corporation

    As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen partner provides should include.

  • Board Ready Endpoint Resilience in 5 Steps

    Sponsored by: Malwarebytes

    The increasing popularity in mobile workspaces and BYOD devices has transformed the way CISOs have to think about security. With cyberattacks on the rise, implementing endpoint resilience is has become critical. In this e-book, uncover the 5 essential steps to establishing endpoint security and the recommendations for achieving each step.

  • The Future of Identity

    Sponsored by: Mitek Systems, Inc.

    Identity will be far different in the years ahead than in all the years before. What’s changing? For better? For worse? In this white paper, discover Mitek’s point of view about today’s state of identity and how to steer toward a more advantageous future of identity.

  • Why automation is essential for cyber resilience

    Sponsored by: Malwarebytes

    While digital transformation equips organizations to be more productive, it also exposes networks to potential threats. This data sheet outlines key insights into the current cybersecurity landscape and highlights why organizations should consider including automation into their strategy.

  • The 5 Most Dangerous New Attack Techniques: Are They Evolving?

    Sponsored by: RSA Conference

    Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.

  • Leveraging Threat Intelligence for Efficient Threat Hunting

    Sponsored by: ThreatQuotient

    In this webinar, ThreatQuotient displays how threat intelligence can be used to help make the threat hunting process more efficient and prioritize threat hunting activities.

  • Threats of Surveillance Tools: Spyware and Stalkerware

    Sponsored by: RSA Conference

    Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.

  • Leading Change for CISOs: Embedding a Secure Culture

    Sponsored by: RSA Conference

    There was a time when cybersecurity was strictly a concern for IT departments, but those days are long gone. In today’s far-reaching threat environment, cybersecurity needs to be baked into the very fabric of a company. In this webcast, learn how organizations can leverage organizational change models for an all-inclusive culture of security.

  • Protecting Intellectual Property: Black, White, and Shades of Gray

    Sponsored by: InteliSecure

    Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.

  • Pervasive Protection: Enabling Secure Work from Anywhere

    Sponsored by: Malwarebytes

    The digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a security challenge. In this infographic, find out what security managers need to know to defend against today’s cyberattacks.

  • Comprehensive Lifecycle Management

    Sponsored by: Insight

    The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.

  • Securing the workplace of the future

    Sponsored by: Tehama

    A stolen or compromised identity is at the heart of many of the major data breaches you read about in the news. With virtual access becoming the norm, ensuring protection for a borderless workplace is critical to maintaining a secure environment. In this white paper, explore 3 key best practices for securing your digital workforce.

  • Datrium Ransomware Protection

    Sponsored by: Datrium

    A recent study found that 1 in 2 companies have suffered a DR event in the past 2 years—and half of those from ransomware. In this white paper, Datrium highlights the categories of ransomware attacks and how to defend against them. Read on to learn more.

  • 6 Practical Approaches to Bridge the Cybersecurity Talent Shortage

    Sponsored by: Alert Logic

    Many organizations are adopting new and emerging technologies faster than they can address related security issues. The situation is further exacerbated by the industry’s skills and resources gap. In this white paper, discover 6 practical approaches to bridge the cybersecurity skills and resource gap in your organization.

  • 2019–2020 Global Application & Network Security Report

    Sponsored by: Radware

    To provide insight into the complex challenges faced by organizations as they seek to balance business agility and security requirements, Radware produced a Global Application & Network Security Report. Download the report to explore real attack data, analyses of developing trends and technologies, and findings from a global industry survey.

  • Security with a Fluid Perimeter

    Sponsored by: Somerville

    While it’s true the perimeter has changed, it has not vanished. Instead, the perimeter has become fluid—changing daily to adapt to the needs of users and modern business, as opposed to the old way of locking down the enterprise. In this white paper, learn how your organization can begin to benefit from this fluid perimeter.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • New Topics on the New Security+ SY0-501 Exam

    Sponsored by: Global Knowledge

    In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.