ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Hardware Research

  • Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Special Report: 2019 Email Security Trends

    Sponsored by: Barracuda

    How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.

  • The Top Industries at Risk for Cyber Attacks

    Sponsored by: Barracuda

    This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.

  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

    Sponsored by: Barracuda

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

  • Understanding and Preventing Finance Phishing Fraud

    Sponsored by: Barracuda

    Today's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.

  • Protecting IIoT Devices from Ransomware and Botnet Infections at Scale

    Sponsored by: Barracuda Networks

    To achieve multi-tiered secure access and cloud scalable security for IIoT devices, read this sheet. It provides you an overview of a secure access controller built for dispersed devices and environments.

  • Keeping Users Safe from Advanced Threats and Unsolicited Content

    Sponsored by: Barracuda Networks

    How can you stop advanced malware from breaching your network perimeter and stealing your valuable data? The following paper explains how to confront—and thwart—these threats using a cloud-based firewall that combines multiple layers of detection for all threat vectors with on-the-fly sandbox execution of unknown files.

  • FineLine Technologies Secures Its Multi-location Network with Barracuda

    Sponsored by: Barracuda Networks

    FineLine Technologies struggled to find a robust firewall system that could be easily deployed across their global offices. This case study covers FineLine's journey and demonstrates how they found a firewall that could secure data across their globally dispersed network.

  • Overview of Barracuda Advanced Threat Protection

    Sponsored by: Barracuda Networks

    The following white paper highlights a multi-layer advanced threat protection approach designed to defend against all threat vectors and across multiple deployment surfaces. Read on to see how your organization could benefit from this four-layered approach.

  • Revisiting Public Cloud Security

    Sponsored by: Barracuda

    From a survey of 300 ITDMs, this report digs into the benefits and challenges of the public cloud and revisits several strategies to strengthen security. Read on to ensure your organization's public cloud security posture is in good standing.

  • Top 10 IT security stories of 2018

    Sponsored by: ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Security Analytics

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • 4 Tech Disruptors that Could Radically Change Security Operations

    Sponsored by: SearchSecurity.com

    Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.

  • Six Criteria for Buying Data Loss Prevention Products

    Sponsored by: InteliSecure

    Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.

  • Introduction to Data Loss Prevention Tools

    Sponsored by: InteliSecure

    In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.

  • SSL: Get the Best for You and Mitigate Vulnerabilities

    Sponsored by: A10 Networks

    Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.

  • Your IIoT Security Plan: Risks in Manufacturing

    Sponsored by: Bayshore Networks

    In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.

  • How to Resolve a Web Application Security Vulnerability

    Sponsored by: Veracode, Inc.

    Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.

  • Application Development Security Requires Forethought

    Sponsored by: Veracode, Inc.

    Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.

  • Resolve Web Security Issues with Industry Experts' Advice

    Sponsored by: Veracode, Inc.

    Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.