ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Why DevOps Has Not Become DevSecOps…Yet

    Sponsored by: WhiteHat Security

    DevSecOps is facing a crisis known to most new technologies: what are the expectations of the technology, and what are the realities? In this webinar, WhiteHat debunks popular DevSecOps myths to understand the actual state of security automation today. Watch the webinar here.

  • Using AppSec Statistics to Drive Better Outcomes

    Sponsored by: WhiteHat Security

    Organizations that invest in DevSecOps see reduced risk, lower costs, and a better time-to-market. Looking for the stats? In this webinar, WhiteHat delivers the application security “state of the union,” breaking down the latest security statistics. Catch up and listen now.

  • The Hidden Obstacle in the Consumer Purchase Path: 3PC Cookies and Domain Calls

    Sponsored by: The Media Trust

    When it comes to digital retail, revenue growth is heavily tied to customer experience. And while third-party capabilities enable a personalized experience, they can also expose vulnerabilities. In this article, go in-depth into the risks of third-party capabilities and discover how to identify and remediate risks.

  • The Seven Essentials of a Modern Email Security Platform

    Sponsored by: Ironscales

    Businesses of all sizes face the risk of data loss from email phishing campaigns, and existing security solutions can’t keep pace with evolving attack methods. In this playbook, uncover the 7 essentials needed to enable email security, and discover why employees are the top method of threat detection.

  • Moving Security Up the Value Chain Through the Power of Partnership

    Sponsored by: Dell SecureWorks

    In this case study, learn how Secureworks deployed a cybersecurity solution across the McLaren group to protect the group in real-time against threats to its IP, data and business processes.

  • Cyber Chief Magazine: 7th Edition

    Sponsored by: Netwrix Corporation

    Even though there are numerous benefits for incorporating cloud capabilities, organizations remain hesitant – likely due to the perceived security deficiencies. This edition of Cyber Chief Magazine addresses this concern by looking at the various types of content stored in the cloud and proven security strategies for protecting that data.

  • Network Security Best Practices

    Sponsored by: Netwrix Corporation

    While ensuring the security of your network is a critical task, the amount of tactics and technologies that exist to support this effort can seem overwhelming. This white paper breaks down the basic aspects, tactics, and best practices related to network security in order to help guide your IT security team. Read on to get started.

  • 6 Steps to Securing Enterprise Data

    Sponsored by: BigID

    Organizations of all sizes need a strong data-centric security policy. Start with these 6 key steps to secure sensitive and personal data across the enterprise.

  • Lookout Phishing and Content Protection

    Sponsored by: Lookout Inc.

    While many organizations have invested into firewalls, gateways and filters to stop email phishing attacks, those methods are ineffective against phishing attacks that target mobile devices. In this data sheet, explore the characteristics of a mobile phishing attack, their impact, and best practices for protecting your network.

  • Key Features in Building a Security Operations Center

    Sponsored by: Rapid7

    Whether a SOC is internally staffed or provided externally, building a security operations center means including some key technical capabilities engineered to cover the full lifecycle of a cybersecurity incident. Download this e-guide to learn about the must-have features when building a SOC.

  • When the Cloud Rains Phish

    Sponsored by: Area 1 Security

    When it comes to phishing attacks, every inbox is a prime target. Hackers are discovering more sophisticated methods for targeting employees that have adapted to overcome world-class defenses. Read this white paper to uncover the modern threats the users encounter and discover how to remedy them.

  • 4 Steps to Building a PII Catalog for Privacy

    Sponsored by: BigID

    Data catalogs digest an input of data in order to accurately organize what it is and where it comes from. Effective catalogs enable organizations to automate policy, implement data security and maintain compliance. This white paper highlights a 4-step process designed to guide an organization in its catalog journey. Read on to learn more.

  • Open Source Network Security Tools

    Sponsored by: AT&T Cybersecurity

    With so many open-source tools available to help with network security, it can be tricky to figure out where to start. This beginner’s guide will provide you with the advice and expertise to help you navigate the extensive selection of tools. Read on to get started.

  • Ironclad APIs: An Approach for Application Security Testing

    Sponsored by: WhiteHat Security

    API security is often overlooked. As it turns out, APIs face many of the same insecurities as web applications. So why are the security strategies for APIs vs. web apps so lopsided? This guide includes the 6 best testing practices your organization can adopt to ensure API security. Read the guide now.

  • Quarterly Threats: Research Report

    Sponsored by: Rapid7

    View this security research report for Rapid7’s key findings of security incidents from Q3 of 2019 and recommendations on how to proceed in 2020.

  • A Buyer’s Guide to Privacy-Centric Data Discovery

    Sponsored by: BigID

    Protecting customer data has never been easy. And with the introduction of regulations like GDPR and CCPA, organizations face heavy penalties for failing to address this issue. Use this buyer’s guide to stay informed on the key components to look for in data discovery partner.

  • The Cost of an Application Security Testing Program

    Sponsored by: WhiteHat Security

    How can your organization decide if an application security testing program is worth the cost? This WhiteHat Security white paper breaks down all the costs involved in application security so your organization can stay secure – and on budget. Read the white paper now.

  • Best Practices for Office 365 Security Monitoring

    Sponsored by: AT&T Cybersecurity

    In order to realize the full benefits of Office 365 cloud applications, establishing an appropriate cloud security strategy is essential. As with any new technology, there are valid security concerns to consider before making the switch. In this white paper, discover the security monitoring best practices for Office 365.

  • Beginner’s Guide to AWS Security Monitoring

    Sponsored by: AT&T Cybersecurity

    In the Beginner’s Guide to AWS Security Monitoring, learn what the 3 biggest security concerns are and how you can get started with AWS security best practices.

  • What to Look for in a Zero Trust Solution in 2020

    Sponsored by: PortSys

    With massive breaches regularly making headlines, it’s clear that traditional security is ineffective at mitigating today’s evolving attacks. The zero-trust approach to access control enables organizations to mitigate risk in the cloud era, taking belief out of the equation and substituting it with assurance. Read on to learn more.

  • Zero Trust Access

    Sponsored by: PortSys

    Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.

  • The Insider’s Guide to Incident Response

    Sponsored by: AT&T Cybersecurity

    As an IT security pro, you need all the help you can get when preventing the worst-case scenario from happening. Luckily, The Insider’s Guide to Incident Response gives you all the tips and tricks you need to know. Download the guide now for info on building an incident response team, the different types of security incidents, and much more.

  • Total Access Control Provides Zero Trust Application Access for Financial Services Firm

    Sponsored by: PortSys

    In this case study, a PortSys customer explains how they needed to make an important decision when Microsoft announced it was ending support for its Unified Access Gateway (UAG). Read on to find out why the team went with Total Access Control (TAC) from PortSys for secure remote access.

  • Oklahoma Municipal Power Authority Energizes Team’s Secure Remote Access with TAC

    Sponsored by: PortSys

    The Oklahoma Municipal Power Authority (OMPA) provides electrical power and energy to Oklahoma’s municipally owned electric systems. But the energy sector’s infrastructure provides an alluring target for cybercriminals. In this case study, learn how OMPA turned to Total Access Control for secure remote access.

  • SIEM for Beginners

    Sponsored by: AT&T Cybersecurity

    Security information and event management (SIEM) is all about observing your network through a wide lens and acting accordingly to mitigate risks and protect your organization. Read this beginner’s guide to help you understand the basics of SIEM and why it’s a critical step towards protecting your business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.