ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Configuration Management: Addressing GRC Challenges

    Sponsored by: ServiceNow

    Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).

  • Threat Hunting and Machine Learning

    Sponsored by: Dell SecureWorks

    In this e-guide, Fidelis president and CEO Nick Lantuh explains why more organizations should embrace the threat hunting process as part of their cybersecurity strategy and shares threat hunting best practices. Lantuh also explains why machine learning has become an important component of the threat hunting process. Read on to learn more.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.

  • Understanding Data Privacy and CCPA

    Sponsored by: Micro Focus

    In this e-guide, get a better understanding of data privacy through two expert articles about the intersection of marketing and data privacy as well as everything you need to know about the California Consumer Privacy Act.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • The End of the Password?

    Sponsored by: Onfido

    Biometric authentication systems have gained traction on mobile devices, but when will they become dominant within the enterprise? Download this e-guide for insights from biometrics expert, Bianca Lopes. She explains why she thinks several steps need to be taken before biometric authentication systems can replace passwords in most enterprises.

  • The End of the Password?

    Sponsored by: Onfido

    Biometric authentication systems have gained traction on mobile devices, but when will they become dominant within the enterprise? Download this e-guide for insights from biometrics expert, Bianca Lopes. She explains why she thinks several steps need to be taken before biometric authentication systems can replace passwords in most enterprises.

  • Why Security Matters in DevOps

    Sponsored by: Trend Micro, Inc.

    DevSecOps has become an essential component to the way we develop, ship, and maintain code, but without proper security practices in place, the DevOps pipeline can lead developers to deploy compromised code. Discover why security for DevOps is so important, as well as tools that can help you build security into your DevOps pipeline.

  • A Guide to Joining DevOps and Security

    Sponsored by: Trend Micro, Inc.

    If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.

  • Who Needs Security Orchestration, Automation and Response?

    Sponsored by: TechTarget Security

    Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to boost the security of an organization's systems and data.

  • Expert Guide to DNS, SME Security, and Zero-Day Attacks

    Sponsored by: Avast Software

    Get up to speed fast on means and methods for reducing or eliminating security-related issues in DNS, an integral service upon which the internet depends.

  • Time to get Prepared for IoT Security Issues

    Sponsored by: IoTAgenda

    If you don't have a strategy to cope with IoT security issues yet, what are you waiting for? With billions of connected devices around the globe, there's no time to waste. View this handbook to explore how digital twins, a critical component of IoT systems today, can help secure IoT systems.

  • Identity and Access Management Tools to Look Out For

    Sponsored by: Okta

    Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.

  • The Best Email Security Comes Through Strategy and Tactics

    Sponsored by: TechTarget Security

    Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.

  • The State of Cybersecurity and How It Will Evolve

    Sponsored by: ALTR

    Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.

  • Incident response playbook in flux as services, tools arrive

    Sponsored by: TechTarget Security

    The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.

  • Explore the Threat Hunting Process

    Sponsored by: TechTarget Security

    The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.

  • The Importance of a Strong Cybersecurity Governance Program

    Sponsored by: Focus Technology Solutions

    Today, companies still struggle to adapt risk management strategies to face modern threats, but maturing their cybersecurity governance processes is a step in the right direction. In this e-guide, learn from multiple cybersecurity experts on how your organization can mature its cyber-risk program to decrease vulnerability.

  • How Healthcare Organizations Can Combat Security Threats

    Sponsored by: Arctic Wolf

    Learn how your organization can meet compliance obligations while maintaining an optimal security strategy that detects and responds to advanced security threats.

  • Complete Guide to Cloud Security in Health IT

    Sponsored by: Virtustream

    In this e-guide, uncover 4 ways that cloud service providers offer advanced protection. You'll also learn about the benefits and drawbacks of considering a cloud-based EHR system.

  • Inside DevOps & Security: What it means for your enterprise

    Sponsored by: GitHub

    Without better organizational discipline, digital businesses are at risk for massively disruptive data breaches and attacks. Can DevSecOps transform IT in time to avert disaster? Download this article to learn more.

  • Build Identity Verification Processes with the Power of AI

    Sponsored by: Jumio

    This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.

  • GETTING GDPR RIGHT

    Sponsored by: Attunity

    Today's businesses can no longer treat customer privacy as an afterthought. Without a singular mandated solution, companies need to create the right GDPR roadmap. Download this white paper to learn more.

  • 8 Simple Steps for Automating Governance, Risk and Compliance (GRC)

    Sponsored by: ServiceNow

    Automating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.

  • User behavior analytics tackles cloud, hybrid environments

    Sponsored by: TechTarget Security

    In this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.