ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Protect Your Sensitive Data

    Sponsored by: Thales

    When it comes to integrating a data protection solution, there are several considerations organizations need to understand prior to choosing a partner, namely – are you looking to protect data at rest, data in motion or both? Read on to unlock a step-by-step guide to finding the right data protection solution for your organization.

  • How to Eliminate Security & Compliance Impediments on Your Journey to the Cloud

    Sponsored by: AWS - Anitian

    In this webcast, learn the business, security, and DevOps benefits of automating security, get an inside look at security automation and how it helps DevOps teams, and discover how to achieve the fastest time-to-market possible on AWS by leveraging cloud security & compliance automation.

  • Seven Must-Have Endpoint Management Capabilities

    Sponsored by: HCL Software

    When endpoint management systems are effectively integrated with security and IT operations tools, they play a major role in proving compliance, stopping threats, consolidating tools, and protecting brands. Read the study to learn the Seven Must-have Endpoint Management Capabilities.

  • 5 Steps to Alleviate Endpoint Management Tool Sprawl

    Sponsored by: HCL Software

    As organizations are forced to establish long-term remote work strategies, cost-saving initiatives become more important than ever. An effective endpoint management strategy can streamline processes while securing endpoints – at a reduced cost. Read this white paper for 5 ways to alleviate the endpoint management tool sprawl.

  • The Three Mega Trends CISOs Need to Watch

    Sponsored by: Hyperproof

    Today’s CISO faces pressure on many fronts – an expanding threat landscape, an exponentially growing volume of data and increasingly stringent data privacy laws. Read this guidebook to discover how CISOs can navigate and manage each of these challenges, and more.

  • Why Seconds Matter

    Sponsored by: Palo Alto Networks

    Todays' hackers are enjoying threats such as polymorphic malware that can avoid detection by constantly changing its identifiable features. How do security teams get around malleable threats? With inline machine learning, organizations may be able to stop threats while keeping business going. To learn more, read this comprehensive white paper.

  • Own and Manage Your Encryption Keys

    Sponsored by: Thales

    As organizations migrate their data to the cloud, encryption strategies need to be revised to reflect the needs of the changing environment. In this white paper, discover the importance of data encryption, the importance of encryption key ownership, and how all of it affects the security of your company’s cloud-native data.

  • Pragmatic Zero Trust

    Sponsored by: Capgemini

    There is no consistent view of what ‘zero trust’ means in practice, particularly now that vendor marketing teams have the term firmly within their sights and intend to label everything ‘zero trust’ as a result. Read this short blog post to cut through the marketing hype and learn the history, nature, and possible future of ‘zero trust.’

  • Encrypted DNS - Mitigating the Impact of DoT and DoH for Service Providers

    Sponsored by: F5 Networks

    DNS is fundamental to how the internet functions, but growth in DNS encryption potentially renders DNS infrastructure redundant. As a result, service providers will need to understand the challenges and opportunities of encrypted DNS. Jump into this webcast to cover the impact of encrypted DNS from the service provider's perspective.

  • 4-step Work From Home Guide

    Sponsored by: HCL Software

    When a crisis manifests, organizations need to respond quickly or risk insolvency. CISOs and security teams must continue to protect sensitive data while teleworking, and IT and security operations must work together to patch and remediate vulnerabilities. Read this BigFix white paper to learn the 4 core capabilities to support secure telework.

  • Technology Supporting People

    Sponsored by: Advizex

    In this case study, discover the results of a healthcare provider’s recent project designed to quantify and better understand the issues they were facing surrounding identity and access management. Read on to discover what led to this project and the outcomes of their partnership with Advizex.

  • The Most Creative Fake Login Pages Against The Biggest Brands In Tech

    Sponsored by: Ironscales

    Take a look at the most creative fake login pages against the biggest brands in tech to see if you can spot if they’re phishing or real.

  • The Legal Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.

  • 3 Enterprise Cybersecurity Resolutions For 2020

    Sponsored by: Capgemini

    In this article, revisit 3 enterprise cybersecurity resolutions made back at the beginning of 2020 which outline best practices for security leaders for the new year as well as the new decade. Read on for a full overview of each resolution.

  • The CIO’s Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.

  • Secure Your Network and Stop Cybercriminals from Capitalizing on a Crisis

    Sponsored by: Comcast Business

    Threat actors have long been taking advantage of increased network vulnerabilities up to this point, but in order to fight the good fight, you must be up to speed on security architectures and technologies that are disrupting both hackers and the security industry. View this data sheet to learn to securely navigate the pandemic.

  • 5 Steps to Determine Residual Risk During the Assessment Process

    Sponsored by: Coalfire

    Governance, risk and compliance-related residual risks are risk factors left over after an organization applies security controls to ensure compliance with laws and regulations. Data management gaps create this risk, but spotting it isn’t impossible. Open this article for 5 steps to identifying and offsetting residual risk during an assessment.

  • A Web of Weak Spots: Securing Your Supply Chain with NDR and Collective Defense

    Sponsored by: IronNet

    Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.

  • Apex One solution brief

    Sponsored by: Trend Micro

    The modern organization consists of distributed endpoints and mobile devices – as such, these new environments require threat detection capabilities that go beyond the scope of traditional threat management. Read this solution brief to learn more about Trend Micro’s Apex One, a modern endpoint threat detection & management offering.

  • Demystifying Converged OT IoT Security

    Sponsored by: Capgemini

    The emergence of IoT devices has created additional stress among IT and security teams. In fact, 80% of security professionals agree that IoT breaches are more expensive to find and fix than traditional breaches. Since it doesn’t look like IoT is going anywhere, what can these teams to do address these threats? Read on to find out.

  • Getting Started with CASB

    Sponsored by: Proofpoint

    Migrating your business to the cloud can increase business agility, flexibility and efficiency. But it also changes your cybersecurity. Without a perimeter, sensitive data can be shared without oversight. And cyber criminals can compromise user accounts to steal funds and data. Read this white paper to learn 4 reasons you should consider a CASB.

  • Achieving Audit-Readiness for Security Standards Compliance in Modern IT Environments

    Sponsored by: Xtravirt

    Modern IT environments are highly complex and staying compliant with security standards can be time-consuming. Download this white paper and discover how your organization can achieve audit readiness, ensure continuity of service, and earn customer trust. Read Now.

  • Global Data at Risk: State of the Web Report

    Sponsored by: Tala Security

    2020 has indisputably been defined as a year of unique events with significant, long-lasting implications. The following report explores the state of the web in order to provide you with emerging trends, threat vectors, hacker behavioral patterns and more – read on to unlock the Global Data at Risk: 2020 State of the Web Report.

  • The 2020 State of Security Operations

    Sponsored by: Palo Alto Networks

    A successful data breach can have devastating impacts – from loss of data to loss of customer trust and potential litigation. This Forrester report aims to identify and understand the challenges facing security operations (SecOps) teams as they work to manage the growing threat of sophisticated data breaches.

  • Cybersecurity Compliance Guide

    Sponsored by: Arctic Wolf Networks, Inc.

    Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.