ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Event Management Research

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: vmware airwatch

    In this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • How to Use an Incident Response Policy to Better Collaborate

    Sponsored by: Delta Risk

    In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: IBM

    Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.

  • Recovering From Ransomware Starts with a Data Protection Strategy

    Sponsored by: Dell Software

    Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.

  • How to Protect Data from Ransomware

    Sponsored by: Dell Software

    It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.

  • Get the Most Out of Your SIEM System

    Sponsored by: Trustwave

    SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.

  • Ransomware Protection is Futile, but All Hope is Not Lost

    Sponsored by: Dell Software

    Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.

  • Preventing Ransomware Threats to Health Data in 10 Steps

    Sponsored by: Cisco Umbrella

    Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.

  • How Healthcare Organizations are Tackling IoT Device Management

    Sponsored by: Cisco Umbrella

    Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.

  • How To Get the Most Out of SOCs

    Sponsored by: ServiceNow

    This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.

  • Defend your Organization with Advanced SIEM and Privileged Account Controls

    Sponsored by: Splunk

    As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.

  • Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security

    Sponsored by: Optum

    In this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.

  • Former Healthcare CIO Talks Cybersecurity in Healthcare

    Sponsored by: Optum

    Gary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.

  • BYOD: Keeping the Benefits While Staying Secure

    Sponsored by: IBM

    In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.

  • If A Hacker Wants Your Data, Make Sure They Really Work For It

    Sponsored by: Carbon Black

    This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.

  • BYOD and mHealth: Navigating Security and HIPAA

    Sponsored by: Optum

    BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.

  • Security Tips for HIPAA-Compliant Cloud Storage and Texting

    Sponsored by: Optum

    Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.

  • Stop Future Threats though Careful Examination of the Malware Lifecycle

    Sponsored by: Check Point Software Technologies Ltd.

    This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.

  • Endpoint threat detection gets more response

    Sponsored by: Hewlett Packard Enterprise

    Discover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.

  • QRadar: Expert SIEM Product Overview

    Sponsored by: IBM

    Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.

  • Cybersecurity skills shortage demands new workforce strategies

    Sponsored by: IBM

    The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.

  • Buyer's Essentials: What to Look for in Single Sign-On Technology

    Sponsored by: TechTarget Health IT

    Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.

  • Recognize Your Security Shortcomings and Address Them with Confidence

    Sponsored by: Dell, Inc. and Intel®

    This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.

  • It's time to tackle IoT security

    Sponsored by: RUCKUS Networks

    The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.