ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • The Cost of an Application Security Testing Program

    Sponsored by: WhiteHat Security

    How can your organization decide if an application security testing program is worth the cost? This WhiteHat Security white paper breaks down all the costs involved in application security so your organization can stay secure – and on budget. Read the white paper now.

  • Best Practices for Office 365 Security Monitoring

    Sponsored by: AT&T Cybersecurity

    In order to realize the full benefits of Office 365 cloud applications, establishing an appropriate cloud security strategy is essential. As with any new technology, there are valid security concerns to consider before making the switch. In this white paper, discover the security monitoring best practices for Office 365.

  • Beginner’s Guide to AWS Security Monitoring

    Sponsored by: AT&T Cybersecurity

    In the Beginner’s Guide to AWS Security Monitoring, learn what the 3 biggest security concerns are and how you can get started with AWS security best practices.

  • What to Look for in a Zero Trust Solution in 2020

    Sponsored by: PortSys

    With massive breaches regularly making headlines, it’s clear that traditional security is ineffective at mitigating today’s evolving attacks. The zero-trust approach to access control enables organizations to mitigate risk in the cloud era, taking belief out of the equation and substituting it with assurance. Read on to learn more.

  • Zero Trust Access

    Sponsored by: PortSys

    Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.

  • The Insider’s Guide to Incident Response

    Sponsored by: AT&T Cybersecurity

    As an IT security pro, you need all the help you can get when preventing the worst-case scenario from happening. Luckily, The Insider’s Guide to Incident Response gives you all the tips and tricks you need to know. Download the guide now for info on building an incident response team, the different types of security incidents, and much more.

  • Total Access Control Provides Zero Trust Application Access for Financial Services Firm

    Sponsored by: PortSys

    In this case study, a PortSys customer explains how they needed to make an important decision when Microsoft announced it was ending support for its Unified Access Gateway (UAG). Read on to find out why the team went with Total Access Control (TAC) from PortSys for secure remote access.

  • Oklahoma Municipal Power Authority Energizes Team’s Secure Remote Access with TAC

    Sponsored by: PortSys

    The Oklahoma Municipal Power Authority (OMPA) provides electrical power and energy to Oklahoma’s municipally owned electric systems. But the energy sector’s infrastructure provides an alluring target for cybercriminals. In this case study, learn how OMPA turned to Total Access Control for secure remote access.

  • SIEM for Beginners

    Sponsored by: AT&T Cybersecurity

    Security information and event management (SIEM) is all about observing your network through a wide lens and acting accordingly to mitigate risks and protect your organization. Read this beginner’s guide to help you understand the basics of SIEM and why it’s a critical step towards protecting your business.

  • Panda Labs Annual Report: Cybersecurity Predictions

    Sponsored by: Panda Security

    Download this report to see how cybersecurity has evolved since 2017 with cybercrime, attacks, and threats. See how future security trends and threat hunting can help your organization reduce the risk of a vicious attack.

  • PandaLabs Annual Report 2018

    Sponsored by: Panda Security

    As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.

  • CISO’s Playbook to Cloud Security

    Sponsored by: Lacework

    As organizations continue to implement cloud technologies and capabilities, they introduce additional security concerns that the CISO needs to consider. In this playbook, uncover the steps and strategies IT security leaders should consider in order to achieve these positive outcomes.

  • Top 10 cyber crime stories of 2019

    Sponsored by: ComputerWeekly.com

    Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.

  • Top 10 cyber security stories of 2019

    Sponsored by: ComputerWeekly.com

    2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.

  • Security Starts at the Edge

    Sponsored by: Akamai Technologies

    Whether you’re a leader of a large enterprise or a smaller business, part of your ongoing security, risk management, and compliance strategy will be sourcing the most effective security solution for your business. In this guide, for learn how you can find the right solution for your business to scale resilience, build trust, and drive revenue.

  • Preventing Unknown, Zero-Day Attacks

    Sponsored by: Checkpoint Software Technologies

    An organizations ability to win the cybersecurity battle depends on how well they prevent unknown, zero-day threats. In this white paper, learn how threat prevention technology, and a consolidated security architecture can help to protect your organization’s attack vectors.

  • Endpoint Security Suites, Q3 2019

    Sponsored by: Checkpoint Software Technologies

    Endpoint security suites are now more than ever being tasked with protecting against targeted-style threats. This Forrester Wave report shows how 15 endpoint security suite providers measure up and helps security and risk professionals select the right one for their needs.

  • Introducing Frictionless Content Security

    Sponsored by: Box

    The paradox of security is the more you lock down content, the harder you make it for users to get their work done. In this video, learn how Box Shield can help reduce the risk of accidental data leakage and protect your business from insider and external threats.

  • The Network Firewall Market

    Sponsored by: Checkpoint Software Technologies

    With firewall providers embedding multiple security features in firewalls and enabling integration and automation capabilities with other security products, firewalls are evolving into network security platforms. In this Gartner Magic Quadrant, explore an evaluation of network firewall vendors.

  • The Definitive Guide to Building and Maintaining Security in Your AWS Environment

    Sponsored by: Checkpoint Software Technologies

    As organizations continue to rely on cloud capabilities for operational efficiency, it’s critical to recognize the differences between cybersecurity in the cloud compared to datacenters. In this e-book, uncover best practices for incorporating AWS security APIs to facilitate scalable, cloud-native security coverage. Read on to get started.

  • Accelerate Innovation with Automated Security

    Sponsored by: Sonatype

    The convenience of open source software for developers is unmatched. However, it’s critical to consider the vulnerabilities of open source software when developing security policies. In this white paper, go in-depth into the Nexus Platform for protecting your organization’s software development lifecycle.

  • How to be a SOAR Winner

    Sponsored by: IBM

    As cyberattacks and malware threats grow increasing sophisticated, implementing an automated and orchestrated security environment is critical for detecting and defecting cyberthreats. Read on to learn about the eight most critical success factors in creating and sustaining an intelligently automated, orchestrated security team.

  • How to be a SOAR Winner

    Sponsored by: IBM

    As cyberattacks and malware threats grow increasing sophisticated, implementing an automated and orchestrated security environment is critical for detecting and defecting cyberthreats. Read on to learn about the eight most critical success factors in creating and sustaining an intelligently automated, orchestrated security team.

  • Gartner report: 2019 Market Guide for Security Orchestration, Automation and Response Solutions

    Sponsored by: IBM

    The first market guide from Gartner to cover the SOAR solution market provides analysis and direction on the current state of the SOAR market, as well as recommendations and key findings to help security and risk management leaders evaluate how a SOAR solution can improve their security operations.

  • The Total Economic Impact of IBM Resilient

    Sponsored by: IBM

    Download the white paper on Intelligent Orchestration to learn best practices for building consistent IR processes and leveraging security orchestration and automation for guided response.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.