ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Industry Research

  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    Sponsored by: TechTarget Security

    This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.

  • Improving iPad enterprise management: Security primer

    Sponsored by: TechTarget Security

    Access this expert resource to learn about how to properly manage enterprise-owned iPads and how to combat potential security vulnerabilities.

  • Security visualisation

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities.

  • Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities

    Sponsored by: GeoTrust, Inc.

    This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.

  • Security-In-Depth Using Integrated Risk-Conscious Controls

    Sponsored by: Tripwire, Inc.

    This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.

  • Comparing health care data security compliance to other industries

    Sponsored by: Hewlett Packard Enterprise

    This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.

  • Computer Weekly - 3 April 2012: Data security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.

  • Presentation Transcript: Balancing compliance with security

    Sponsored by: HP Enterprise Security

    This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.

  • Computer Weekly - 13 March 2012: The economics of private cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.

  • The CISOs Guide to Measuring IT Security

    Sponsored by: Lumension

    In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.

  • X-Force Mid-Year Trend Report

    Sponsored by: IBM

    This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.

  • Aligning Security to Provide the Anticipated Business Results

    Sponsored by: AT&T Corp

    This resource looks at some of the more important questions IT managers should consider when implementing a security solutions strategy.

  • Internal controls checklist for corporate data protection, compliance

    Sponsored by: Novell, Inc.

    In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.

  • Cybersecurity Readiness Study: An Executive Summary

    Sponsored by: ArcSight, an HP Company

    This study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats.

  • Handle with Care: Calculating and managing risk is tricky business

    Sponsored by: TechTarget ComputerWeekly.com 

    In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape.

  • Register Free to Visit Infosecurity Europe - 19th - 21st April 2011

    Sponsored by: Infosecurity Europe

    Europe's No. 1 Information Security event, with an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise.

  • DATA Act Protection: Effects of a Federal Breach Notification Law

    Sponsored by: CDW Corporation

    This E-Guide examines new reporting requirements and how your organization will have to report a breach to the FTC and what new steps you’ll have to institute to comply.

  • Privileged user management: It's time to take control

    Sponsored by: CA Technologies

    IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.

  • Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security

    Sponsored by: Faronics

    In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.

  • IT Decision Checklist: SIMs and Log Management

    Sponsored by: LogLogic, Inc.

    In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.

  • Information Security Magazine - October 2009: Security 7 Awards

    Sponsored by: Information Security Magazine

    The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more.

  • Video Surveillance Economics: The New Picture of Quality and Economy

    Sponsored by: Motorola Solutions

    As the world becomes increasingly security conscious, municipalities, institutions and enterprises of all sizes are discovering that there's safety in sight. Real-time video surveillance systems are proving to be one of the most effective methods of addressing a wide range of security challenges in both the public and the private sectors.

  • Linear Architecture for Municipal Wireless Video Surveillance Solutions

    Sponsored by: Motorola Solutions

    Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed.

  • Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee

    Sponsored by: Information Security Magazine

    This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.

  • Information Security Magazine: March 2009 - Sky-High Risk?

    Sponsored by: Information Security Magazine

    This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.