ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive

    Sponsored by: Splunk

    This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards.

  • The CISO'S Guide to Machine Learning & User and Entity Behavioral Analytics

    Sponsored by: Hewlett Packard Enterprise

    Utilize this 40-page CISO's guide to machine learning to learn how combining all of a user's data along with machine learning insights, UBEA becomes a powerful approach to detecting threats inside an organization and empowers analysts with new threat hunting capabilities.

  • AV Replacement Guide

    Sponsored by: CrowdStrike

    This guide is designed to help security professionals who are considering replacing their current antivirus and/or endpoint protection programs.

  • How to Design and Maintain a Secure ICS Network

    Sponsored by: SecurityMatters

    Learn about the IEC 62443 standards and their limitations so that you can reduce the exposure of industrial networks to constantly evolving threats with analytics, network segmentation, enhanced threat detection, and more.

  • The City of Frankfurt Enables Work from Home with Two-Factor Authentication

    Sponsored by: One Identity

    Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.

  • Deception Technology Comes of Age

    Sponsored by: Illusive Networks

    Today, deception technology is gaining more and more attention as an innovative cybersecurity technology that can shift the balance of power back to your business. This white paper details how to embrace deception as a network security tool with 5 compelling reasons.

  • Why Deception is Essential to Your Cybersecurity Strategy

    Sponsored by: Illusive Networks

    The average time that attackers live inside an enterprise network before being detected is 146 days. This Frost and Sullivan report details how deception security technologies can speed up detection and cause attackers to expose their vulnerabilities.

  • Demystifying IT Risk to Achieve Greater Security & Compliance

    Sponsored by: Lynx Technology Partners

    Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.

  • Achieve Effective PCI Compliance by Automating Required Controls and Processes

    Sponsored by: Skybox Security

    Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.

  • What is Attribute-Based Access Control?

    Sponsored by: Axiomatics

    Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.

  • Breach Prevention: The New Way Forward

    Sponsored by: NSS Labs

    Attackers are able to bypass traditional endpoint and perimeter-based security solutions. This white paper explains why organizations are adopting breach detection systems (BDS) to evolve with the ever-changing threat landscape.

  • CW ANZ – February 2018: Prepare for EU data law

    Sponsored by: ComputerWeekly.com

    Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws.

  • Reduce Your Audit Tax: Five Methods to Lessen the Burdens

    Sponsored by: Lynx Technology Partners

    The security and regulatory environment these days has mushroomed to the point that very few organizations ever go untouched by the auditor's viewfinder. Access this resource to uncover the 5 steps to developing and implementing an audit tax strategy for greater automation of data collection and reporting.

  • The next wave of IoT in Asia: What to expect in 2018

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.

  • Cyber Security Framework Checklist

    Sponsored by: Lynx Technology Partners

    This resource will walk you through creating your own IT risk program that follows the key elements of the NIST Cyber Security Framework. As an added bonus, uncover 3 reminders for establishing security best practices.

  • The Rising Face of Cybercrime: Ransomware

    Sponsored by: BitSight

    This BitSight Insights Report examines the cybersecurity performance of nearly 20,000 organizations in the face of rising ransomware attacks. Uncover the report's 5 key findings about the different types of ransomware attacks across industries like education, government, and finance.

  • Bell Helicopter Enables Attribute-Based Access Control and Authorization

    Sponsored by: Axiomatics

    In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.

  • Stop the Cybersecurity Guessing Game

    Sponsored by: NSS Labs

    According to Gartner, security spending keeps growing and it will increase by 26% in the next 3 years. However, many organizations are unclear of how secure they really are. Access this white paper to uncover how to address the unmitigated risks created by today's threats.

  • 3 Use Cases for Deception Technology in Financial Services

    Sponsored by: Illusive Networks

    This white paper details how a deception solution can help lay the foundation for an active defense program. In addition, uncover 3 use cases for deception technology in financial services, as the industry plays an important role in shaping network and security best practices regarding cybersecurity.

  • What is The Multi-Cloud?

    Sponsored by: Fortinet, Inc.

    This white paper explores why the usual methods of cloud security are not able to effectively secure multi-cloud environments. Then, learn how an open standards-based fabric of integrated and adaptive security products could provide the visibility and coordination needed to provide a high level of protection.

  • Painless DevSecOps Integration across the Value Stream

    Sponsored by: Tasktop

    This webcast explores how to take a DevSecOps approach to minimizing the impact of vulnerabilities on your apps. Find out how to make developers, QAers, and security pros aware of vulnerabilities as soon as possible and discover how you can integrate tools end-to-end across the value stream.

  • Making GRC Understandable, Actionable, and Auditable for New Regulations

    Sponsored by: ServiceNow

    Tune into this webinar to learn how to make GRC understandable, actionable and auditable for new regulations, such as GDPR.

  • Economic, Operational & Strategic Benefits of Security Framework Adoption

    Sponsored by: Tenable, Inc.

    What are the business and security benefits that come from adopting a security framework? In this 96-page e-book, 38 information security leaders share success perspectives and lessons learned regarding their security framework.

  • Economics of Insecurity

    Sponsored by: Cylance

    Traditional AV companies don't want to help you prevent attacks. They want to help you react to breaches - so they can sell you more solutions with every intrusion. It's all part of the "Economics of Insecurity". Tired of the status quo and investing in more of the same old technology? Learn why it's time to think beyond the stack.

  • CW Benelux February 2018

    Sponsored by: ComputerWeekly.com

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.