ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Research

  • How to update, automate your IR processes

    Sponsored by: Booz Allen Hamilton

    In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.

  • The Case for Modern SOCs

    Sponsored by: TechTarget Security

    In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.

  • What does a CISO do now? It's a changing, increasingly vital role

    Sponsored by: TechTarget Security

    What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.

  • Why Security in DevOps is Essential to Software Development

    Sponsored by: TechTarget Security

    What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.

  • Owner-controlled PKI: The Next Step in Securing IoT

    Sponsored by: DigiCert

    Learn how owner-operated PKI is making strides in becoming the most secure option for IoT users.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • The Risks and Flaws of Open Source Security

    Sponsored by: Flexera Software

    Is open source software too much of a risk for enterprises? Before using open source software, you should consider (and understand) the risks involved. In this expert e-guide, featuring tips from industry pros Mike O. Villegas and Michael Cobb, learn what you need to watch out for when it comes to open source security.

  • Ransomware and Cloud Security: Keys to Stop the Threat

    Sponsored by: Cisco Umbrella

    Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.

  • Six Criteria for Buying Data Loss Prevention Products

    Sponsored by: InteliSecure

    Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.

  • Introduction to Data Loss Prevention Tools

    Sponsored by: InteliSecure

    In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.

  • How the Basics of Network Security Have Evolved

    Sponsored by: Fortinet, Inc.

    In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.

  • Your Guide to Combatting Ransomware's Domination of 2017

    Sponsored by: CyberArk

    Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.

  • SSL: Get the Best for You and Mitigate Vulnerabilities

    Sponsored by: A10 Networks

    Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.

  • Your IIoT Security Plan: Risks in Manufacturing

    Sponsored by: Bayshore Networks

    In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.

  • How to Resolve a Web Application Security Vulnerability

    Sponsored by: Veracode, Inc.

    Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.

  • Application Development Security Requires Forethought

    Sponsored by: Veracode, Inc.

    Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.

  • Resolve Web Security Issues with Industry Experts' Advice

    Sponsored by: Veracode, Inc.

    Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.

  • How to Effectively Manage the Cloud Logs of Security Events

    Sponsored by: Splunk

    Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.

  • Comparing Top Shelf Email Encryption Software Products

    Sponsored by: Hewlett Packard Enterprise

    Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.

  • Incident Response Tools Can Help Automate Your Security

    Sponsored by: ModoModo

    A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.

  • Top Mobile Security Threats: Insight Into Threats and Attackers

    Sponsored by: Lookout

    Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.

  • Incident Response Tools Can Help Automate Your Security

    Sponsored by: Cisco Umbrella and Dimension Data

    In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.

  • 7 Elements of Cybersecurity Readiness

    Sponsored by: Cisco Umbrella and Dimension Data

    Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: tCell

    Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.

  • Application Development Security Requires Forethought

    Sponsored by: tCell

    Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.