ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Three Questions to Ask Before you Migrate Apps to the Public Cloud

    Sponsored by: Oracle Dyn

    Many firms assume public cloud is the best place to host all apps, but that's not always the case. Find out why in this essential guide.

  • Why Web Application Attacks are a Growing Threat to the Cloud

    Sponsored by: Oracle Dyn

    New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.

  • Cryptojacking Attacks May Not Challenge Ransomware Dominance

    Sponsored by: Cisco Umbrella

    Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.

  • How to Prevent Cloud Cryptojacking Attacks on your Enterprise

    Sponsored by: Cisco Umbrella

    Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.

  • Enterprises Wear Large Targets in Cloud Cryptomining Hacks

    Sponsored by: Cisco Umbrella

    Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.

  • The Future of Identity and Access Management Tools

    Sponsored by: Jumio

    Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity management that relies less on user actions and more on known things, places, and experiences.

  • Cyberthreats and Risks in the Payment Card Industry

    Sponsored by: Jumio

    Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.

  • Cloud Security Pros Finding their Voice

    Sponsored by: Cavirin

    Find out how the DevSecOps and the NIST Cybersecurity Framework both put the long-lost co-worker, the security pro, front and center.

  • Securing content and access with smart management techniques

    Sponsored by: TechTarget Content Management

    When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.

  • Adapt Security for Hybrid Cloud Environments

    Sponsored by: Citrix

    In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.

  • GDPR: 10 essential facts you need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we give you the top 10 key facts you need to know about the General Data Protection Regulation according to privacy lawyer and KuppingerCole analyst, Karsten Kinast. Taken from the European Identity & Cloud Conference in 2016.

  • Information Security: Companies Aren't the Only Ones Migrating to Cloud

    Sponsored by: TechTarget Security

    Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.

  • GDPR Looms with Organizations Still Unprepared

    Sponsored by: Data443

    GDPR regulations are looming, and not every company is prepared. In this expert e-guide, explore how data management software suppliers are trying to help companies get on track and avoid stiff GDPR penalties.

  • Botnet attacks are evolving; your defenses must too

    Sponsored by: AppGuard

    Botnet attacks will expand and evolve. The best way to fight back is to stop searching for the perfect botnet-protection tool and layer defenses instead.

  • How to update, automate your IR processes

    Sponsored by: Booz Allen Hamilton

    In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: TechTarget Security

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • The Tug of War Between UBA and SIEM

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.

  • Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape

    Sponsored by: Juniper Networks, Inc.

    This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.

  • Buyers Guide: Network Security Management

    Sponsored by: Palo Alto Networks

    When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.

  • Expert Perspectives on Data Protection and GDPR Compliance

    Sponsored by: CyberArk

    A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.

  • Managing Access to Keep Privileged Users' Credentials Secure

    Sponsored by: TechTarget Security

    Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list.

  • Why Security in DevOps is Essential to Software Development

    Sponsored by: TechTarget Security

    What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.

  • GDPR Breach Notification Rule Could Complicate Compliance

    Sponsored by: Lepide Software

    Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.

  • IT Security Trends to Know

    Sponsored by: Cisco Umbrella

    The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.

  • How to Find the Best DDoS Attack Prevention and Detection Tools

    Sponsored by: TechTarget Security

    Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.