Security Best Practices Research
-
5 steps to secure home devices & improve productivity for remote work
Sponsored by: BarracudaDue to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
-
Ransomware Threat Spotlight
Sponsored by: BarracudaAnother unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
-
Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
Sponsored by: BarracudaSpear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
-
Evaluating Data-centric Protection Solutions
Sponsored by: Comforte AGData is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
-
Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
Sponsored by: TechTarget ComputerWeekly.comIn this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
-
Enable And Protect Your Remote Workforce
Sponsored by: AT&T CybersecurityDownload this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
-
Future-Proofing Enterprise Security Awareness in the Age of Workforce Mobility
Sponsored by: BarracudaWith enterprises gearing towards a more mobile workforce, security awareness is now more important than ever – and the trends behind it are crucial for IT professionals. To get a sense of the readiness of organizations in employee awareness and training, read this Forrester report to explore these trends, as well as priorities, in this space.
-
Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
-
Brave the new normal: How companies in Asia-Pacific are overcoming security challenges in a remote workplace.
Sponsored by: BarracudaAccording to a recent study, 62% of APAC organizations said they wouldn’t have implemented remote working for another 5 years if it weren’t for COVID-19. The rapid adoption of the new normal has left many of these organizations vulnerable – read this white paper to learn how APAC organizations are addressing these security challenges.
-
GoSecure Cybersecurity Perceptions Versus Reality
Sponsored by: GoSecureThis 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
-
Danger within: email and security awareness training strategies for effective account takeover protection
Sponsored by: MimecastIt’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
-
Insights into attacker activity in compromised email accounts
Sponsored by: BarracudaSpear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
-
Boost hybrid cloud security
Sponsored by: Red Hat and IntelAs security evolves, so too do threats. In a world that is quickly moving to cloud architectures (94% of organizations are using some type of cloud), security has never been prioritized more. The cost-saving benefits of cloud are all proven, but without the right security, the risk is not worth the gain. Dive into this e-book to learn more.
-
STEP 2: A Guide to Setting Up Your Insider Threat Management Program
Sponsored by: ProofpointIn this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
-
THREAT AND VULNERABILITY MANAGEMENT
Sponsored by: CoalfireLearn how Coalfire's Strategy+ framework ensures that your security measures and tactics align with your organization's business objectives. Their threat modeling and attack simulation services move your security posture to the next level of protection.
-
The Cisco Umbrella Advantage
Sponsored by: CiscoToday, “the office” can be anywhere, and traditional security just can't keep up. That's where Cisco Umbrella comes in. Powered by predictive intelligence, Umbrella acts as your first line of defense against threats. Read this e-book to learn how this unique advantage can make a difference for your organization.
-
Five Pillars of an actionable Cloud Security Framework in Azure
Sponsored by: BarracudaIn order to ensure a responsible cloud migration, organizations need to ensure that they secure the network, applications and data that will reside in their cloud environment. This white paper takes the widely used NIST Cybersecurity Framework and turns it into 5 actionable pillars. Read on to get started.
-
Secure SD-WAN: the launch pad into cloud.
Sponsored by: BarracudaMost organizations intend to leverage the many benefits of SD-WAN, including stronger security, better performance, improved user experience and cost optimization. However, like many emerging technologies, SD-WAN does not come without its challenges. In this research report, explore adoption trends of SD-WAN across the globe.
-
Future Shock: The Cloud is the New Network
Sponsored by: BarracudaIn this report, delve into the impact of the security roadblocks the integration of cloud native network services and cloud infrastructure comes with and how your organization can remove them for faster public cloud adoption.
-
The Business Case for Cloud Threat Defense
Sponsored by: Palo Alto NetworksIn order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.
-
Container Security 101: Understanding the Basics of Securing Containers
Sponsored by: Palo Alto NetworksContainer environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.
-
The state of SIEM
Sponsored by: AT&T CybersecurityTake a look at the state of the SIEM in 2020 and how platforms like AT&T Unified Security Management (USM) are redefining this space by going beyond simply collecting, correlating, and analyzing log data.
-
The Relationship Between Security Maturity and Business Enablement
Sponsored by: AT&T CybersecurityAT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.
-
Solving the Challenges of Modern Remote Access
Sponsored by: BarracudaThe recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
-
Ponemon - Costs and Consequences of Gaps in Vulnerability Response
Sponsored by: ServiceNowPonemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.