ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Key Steps in Satisfying Your CCPA and Other Privacy Obligations

    Sponsored by: PerimeterX

    In order to avoid the severe financial, legal and reputational penalties that can apply to companies fail to meet regulations, organizations need to ensure that their data protection strategy is fine-tuned for 2020. In this Osterman Research report, uncover key steps your organization needs to take to prepare for the CCPA.

  • Connected Car Security

    Sponsored by: Intertrust

    As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.

  • Taking Steps to Protect Financial Mobile Applications

    Sponsored by: Intertrust

    Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.

  • 3 Ways to Reduce PCI DSSv3.2 Audit Scope

    Sponsored by: Comforte AG

    Discover a quick reference guide summarizing PCI requirements and common technologies deployed to meet the requirements

  • Reverse Engineering Still a Serious Problem in 2019

    Sponsored by: Intertrust

    While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.

  • Top 5 Threats to E-commerce Businesses to Address Before the Holiday Season

    Sponsored by: PerimeterX

    With the holiday season approaching, it’s essential that online retail companies ensure they are prepared for the cybersecurity threats they face. This video highlights the top 5 threats to e-commerce businesses companies need to be vigilant before this, and any, holiday season. Tune in to learn about these 5 holiday attack trends.

  • Threat Intelligence Report November 2019

    Sponsored by: Mimecast

    Mimecast threat researchers developed key insights about the types of attacks that proliferate each quarter, as well as new attacks cropping up. In this quarter’s report, learn about the modified forms of malware being used in impersonation attacks, the channels they go through, and the proactive security measures your organization can take.

  • The Importance of Cybersecurity for Executives

    Sponsored by: A-Lign

    As security threats become increasingly frequent, complex and disruptive, it’s critical for all leaders – not just the CIO, CTI and CISO – of an organization to play a role in ensuring security. In this white paper, explore the importance of cybersecurity for executives by looking at the common types of attacks and how to prevent them.

  • The Cybersecurity Guide: Defending from Threats and Preventing Hacks

    Sponsored by: A-Lign

    Organizations in every industry and at every size are vulnerable to data breaches or breach incidents. This cybersecurity guide exposes the threats that your organization could be vulnerable to and outlines threat prevention tactics in order to fortify your organization.

  • Castle Ventures Case Study

    Sponsored by: Siemplify

    Like most companies providing managed security services, Castle Ventures manages a variety of disparate technologies for its clients. In this case study, explore how Castle Ventures was able to address their overwhelming workload to streamline alerts, manage client security stacks and provide compliance reporting.

  • Best Practices Award: Email Security Global

    Sponsored by: Mimecast

    The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.

  • Five Major Bot Threats to Holiday E-commerce and How to Stop Them

    Sponsored by: PerimeterX

    With the holiday season approaching, it’s essential that online retail companies ensure they are prepared for the cybersecurity threats they face. This white paper highlights 5 major types of attacks companies need to be vigilant of and defensive capabilities for addressing these threats. Read on to make sure your organization is ready.

  • Preparing for a Data Breach: Not If, But When

    Sponsored by: A-Lign

    When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.

  • Decluttering Your Security Environment

    Sponsored by: Mimecast

    While it’s natural to think that the solution to increased security risk is incorporating more technology, overcomplicating your environment with tools – and not the right personnel – can lead to increased risk. In this white paper, leverage expertise from a recent think tank for advice on how to address cybersecurity complexity.

  • Bringing it all Together: Okta, HR and Your Directories

    Sponsored by: Okta

    For IT and HR, managing access to multiple applications for employees can be challenging. In this infographic, learn how IAM and user lifecycle management can make it easier to manage systems by automation the onboarding and offboarding of key apps and resources for every employee.

  • Insider Threat Management in 2020 – What’s Your Plan?

    Sponsored by: ActivTrak

    Whether malicious or accidental, insider attacks can leave organizations feeling vulnerable and eager to prevent future incidents, and a little bit of consideration can save time and money when incidents occur. Read this white paper to uncover the key areas to consider for your 2020 insider threat program checklist.

  • The Beginner’s Guide to Bug Bounty Programs

    Sponsored by: HackerOne

    In The Beginners’ Guide to Bug Bounty Programs, discover how organizations including Starbucks, Airbnb, GitHub, Hyatt, Nintendo and Google Play are working with hackers to protect their customers and brands.

  • How to Prevent Data Theft from Departing Employees

    Sponsored by: ActivTrak

    When it comes to cybersecurity, many organizations look to bolster their defenses against external threats, while overlooking some of the internal threats posed by departing employees. In this article, uncover the 5 steps your organization should consider for protection from internal data theft.

  • Building Online Portals for Your Customers and Partners with Okta

    Sponsored by: Okta

    Read on to view how Okta's IAM service can allow organizations to present a single, well-integrated web application to all customers and partners, who can navigate it with a single set of credentials.

  • VMware NSX Cloud and AWS

    Sponsored by: VMware

    In this brief, learn how VMware NSX Cloud can help provide a common and consistent way to secure and manage cloud native workloads across the public cloud as well as on-premises workloads.

  • 5G, AI, Deepfakes and Beyond: The Future of IT and Security

    Sponsored by: Splunk

    The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.

  • Transform the Customer Experience with a Modern Customer IAM Solution

    Sponsored by: Okta

    Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.

  • 6 Best Practices to Improve Visibility and Accelerate Response

    Sponsored by: ReliaQuest

    The problem today is that there are too many tools, too little integration among them, and more noise than a team can analyze and understand – all of which add up to less visibility into threats and less efficient security teams. In this white paper, learn how automation an simplify security and add content to threats and workflows.

  • Email Security Risk Assessment for Microsoft Office 365

    Sponsored by: Mimecast

    View this infographic that reveals the results of Email Security Risk Assessment tests showing the number and type of unwanted and dangerous emails missed by organizations’ Microsoft Office 365 implementations.

  • Preventing PeopleSoft Breaches

    Sponsored by: Appsian

    Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.