ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Key Protection with Intertrust whiteCriterion Secure Key Box

    Sponsored by: Intertrust

    Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.

  • Key Steps in Satisfying Your CCPA and Other Privacy Obligations

    Sponsored by: PerimeterX

    In order to avoid the severe financial, legal and reputational penalties that can apply to companies fail to meet regulations, organizations need to ensure that their data protection strategy is fine-tuned for 2020. In this Osterman Research report, uncover key steps your organization needs to take to prepare for the CCPA.

  • Connected Car Security

    Sponsored by: Intertrust

    As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.

  • Taking Steps to Protect Financial Mobile Applications

    Sponsored by: Intertrust

    Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.

  • 3 Ways to Reduce PCI DSSv3.2 Audit Scope

    Sponsored by: Comforte AG

    Discover a quick reference guide summarizing PCI requirements and common technologies deployed to meet the requirements

  • Reverse Engineering Still a Serious Problem in 2019

    Sponsored by: Intertrust

    While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.

  • Top 5 Threats to E-commerce Businesses

    Sponsored by: PerimeterX

    This video highlights the top 5 threats to e-commerce businesses companies need to be vigilant before this, and any, holiday season. Tune in to learn about these 5 attack trends.

  • Threat Intelligence Report November 2019

    Sponsored by: Mimecast

    Mimecast threat researchers developed key insights about the types of attacks that proliferate each quarter, as well as new attacks cropping up. In this quarter’s report, learn about the modified forms of malware being used in impersonation attacks, the channels they go through, and the proactive security measures your organization can take.

  • The Importance of Cybersecurity for Executives

    Sponsored by: A-Lign

    As security threats become increasingly frequent, complex and disruptive, it’s critical for all leaders – not just the CIO, CTI and CISO – of an organization to play a role in ensuring security. In this white paper, explore the importance of cybersecurity for executives by looking at the common types of attacks and how to prevent them.

  • The Cybersecurity Guide: Defending from Threats and Preventing Hacks

    Sponsored by: A-Lign

    Organizations in every industry and at every size are vulnerable to data breaches or breach incidents. This cybersecurity guide exposes the threats that your organization could be vulnerable to and outlines threat prevention tactics in order to fortify your organization.

  • Best Practices Award: Email Security Global

    Sponsored by: Mimecast

    The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.

  • Five Major Bot Threats to E-commerce and How to Stop Them

    Sponsored by: PerimeterX

    It’s always important that online retail companies are prepared for any cybersecurity threats to keep both customer and company data secure. Luckily, this white paper highlights 5 major types of attacks companies need to be vigilant of, as well as defensive capabilities for addressing these threats. Read on to make sure your organization is ready.

  • Preparing for a Data Breach: Not If, But When

    Sponsored by: A-Lign

    When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.

  • Decluttering Your Security Environment

    Sponsored by: Mimecast

    While it’s natural to think that the solution to increased security risk is incorporating more technology, overcomplicating your environment with tools – and not the right personnel – can lead to increased risk. In this white paper, leverage expertise from a recent think tank for advice on how to address cybersecurity complexity.

  • Bringing it all Together: Okta, HR and Your Directories

    Sponsored by: Okta

    For IT and HR, managing access to multiple applications for employees can be challenging. In this infographic, learn how IAM and user lifecycle management can make it easier to manage systems by automation the onboarding and offboarding of key apps and resources for every employee.

  • The Beginner’s Guide to Bug Bounty Programs

    Sponsored by: HackerOne

    In The Beginners’ Guide to Bug Bounty Programs, discover how organizations including Starbucks, Airbnb, GitHub, Hyatt, Nintendo and Google Play are working with hackers to protect their customers and brands.

  • Building Online Portals for Your Customers and Partners with Okta

    Sponsored by: Okta

    Read on to view how Okta's IAM service can allow organizations to present a single, well-integrated web application to all customers and partners, who can navigate it with a single set of credentials.

  • 5G, AI, Deepfakes and Beyond: The Future of IT and Security

    Sponsored by: Splunk

    The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.

  • Transform the Customer Experience with a Modern Customer IAM Solution

    Sponsored by: Okta

    Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.

  • Email Security Risk Assessment for Microsoft Office 365

    Sponsored by: Mimecast

    View this infographic that reveals the results of Email Security Risk Assessment tests showing the number and type of unwanted and dangerous emails missed by organizations’ Microsoft Office 365 implementations.

  • Preventing PeopleSoft Breaches

    Sponsored by: Appsian

    Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.

  • Dutch organisations demand more from government

    Sponsored by: ComputerWeekly.com

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

  • Splunk IT Security Predictions 2020

    Sponsored by: Splunk

    Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.

  • Who should get the technology vote in the UK General Election?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.

  • 14 Zero Trust eXtended (ZTX) Ecosystem Providers

    Sponsored by: Okta

    Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.