ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Industry Research

  • Next-generation technologies and cybersecurity

    Sponsored by: Verizon

    The details of the future of cybersecurity can be daunting, but the world of technology evolves quicker than any species. If your organization is not prepared, it will be under heavy threat, and soon.View this white paper to explore some of the key cybersecurity implications of new and emerging technologies.

  • The Challenges of Trusted Access in a Cloud-First World

    Sponsored by: Thales

    The 2020 Access Management Index is a survey of 300 IT professionals across the U.S. and Brazil with responsibility for, or influence over, IT and data security.In this case study, read how these professionals answered questions regarding cloud access management as well as next steps and guidelines for adopting access management solutions.

  • Cyberattacks on mobile devices are on the rise

    Sponsored by: Verizon

    5G networks promise increased security, but as it stands now, many organizations need to implement their own mobile security measures. Greater functionality means greater vulnerability, and your network must be ready.This article describes the new threat landscape that arrives with 5G and tells you how your organization can prepare.

  • How Next-Gen Networking Technologies Improve Security

    Sponsored by: Verizon

    69% of organizations claim that their network management team finds it challenging to balance availability and security. Additionally, data security improvement is reported to be most important among network strategists. This webcast may help you to stay ahead of the curve. Topics include security awareness, business continuity, and SD-WAN.

  • You've Got BEC!

    Sponsored by: Proofpoint

    BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.

  • MSPs: The 5 Essentials from Your Endpoint Security Partner

    Sponsored by: Malwarebytes

    When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.

  • Kaspersky Lab’s COVID-19 Relief Initiatives

    Sponsored by: Kaspersky Lab

    Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.

  • MSP best practices for securing servers

    Sponsored by: Malwarebytes

    Servers are the backbone of any managed service provider (MSP) making them a major target for spyware and ransomware. Access this data sheet to learn 4 best practices for securing your servers to ensure your organizations critical information is safe from online attackers.

  • Proactive Security: Software vulnerability management and beyond

    Sponsored by: ComputerWeekly.com

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

  • Enhancing Security Automation

    Sponsored by: TITUS

    Download the following solution overview to discover how Titus’s security automation tools are equipping enterprises with the confidence to make accurate and effective data security decisions, bring context to cloud security policies, and more.

  • Data Security: Best Practices for Remote Workers

    Sponsored by: TITUS

    How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.

  • Innovation Insight for Extended Detection and Response

    Sponsored by: Trend Micro

    Access this white paper for an overview of XDR and weigh its pros and cons to decide whether it could be an effective solution for your organization.

  • 5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile

    Sponsored by: NowSecure

    Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.

  • Doing DevSecOps Right: Implementation & the Metrics that Matter

    Sponsored by: Capsule8

    DevSecOps is a crucial part of an emerging security and IT strategy, one which realizes that security has to be implemented early, often, and in a more flexible manner. But how can your company adopt these practices, and then measure their effectiveness? Watch this Capsule8 video to learn some effective DevSecOps principles and metrics.

  • Secure remote access with zero trust

    Sponsored by: Merlin International

    Although all most all federal employees are working from home during the COVID-19 pandemic, federal agencies are still face issues regarding network security. Access this white paper to learn strategies for securing workloads, legacy systems, and remote access and discover the 7 benefits this can lead to for federal agencies.

  • 2020 Cost of Insider Threats Global report

    Sponsored by: Proofpoint

    Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.

  • The Evolution of Ransomware - Threat Intelligence Observations for 2020 and Beyond

    Sponsored by: Crowdstrike

    Attend this webcast to learn about the ransomware cyber threat landscape, using strategic, operational and tactical assessments to shine lights on points of exposure, and how technical knowledge, intel, threat hunting and partners can help pave the way forward.

  • The Ultimate Cybersecurity Guide for the IT Professional

    Sponsored by: VMware International Unlimited Company

    Whether you've been in IT for a long time or are just starting out, there is an expectation that everyone in IT should have some degree of exposure to InfoSec. Tap into this comprehensive guide on the basics of cybersecurity to help you get started.

  • RSA Conference 2020 guide: Highlighting security's human element

    Sponsored by: ComputerWeekly.com

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

  • Assess and Manage Cryptographic Security with Entrust Datacard™

    Sponsored by: Entrust, Inc.

    In this data sheet, take a closer look at the key features and capabilities of AgileScan, one of Entrust Datacard’s offerings focused on ensuring the security of cryptographic inventories and life cycles. Read on to learn more about AgileScan.

  • The Right Roles for SIEM and EDR

    Sponsored by: Cybereason

    While most organizations recognize the need for security incident response and threat hunting, many are uncertain how to go about configuring a setup that meets their needs. In this white paper, explore the and benefits of configuring SIEM technologies with new tools like EDR and SOAR.

  • End-to-End Security Solutions for Mid-Market Businesses

    Sponsored by: Dell Technologies and Intel

    Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.

  • 2020 Global Threat Report

    Sponsored by: Crowdstrike

    Each year, the CrowdStrike Intelligence team releases a report of their findings from looking into cyberattack trends and emerging adversaries over the previous year. This year’s report examines key trends in ransomware and eCrime as well as an overview of state-sponsored adversaries and their suspected motives.

  • The 4 Levels of Automated Remediation

    Sponsored by: Egress Software Technologies Inc

    Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.

  • Your Guide to Threat Intelligence, AI & Incident Response

    Sponsored by: Dell SecureWorks

    Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.