ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Research

  • Straddling the Security Divide Between On-Premises and Cloud

    Sponsored by: TechTarget Security

    Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

  • How to Segment Cloud Workloads for Better Security

    Sponsored by: IBM

    Enterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • When Your IAM Policy Encounters the Internet of Things

    Sponsored by: Unisys

    Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.

  • IoT Security Testing: Cover All Your Bases

    Sponsored by: Synopsys

    Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: vmware airwatch

    In this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.

  • The Connection between IoT and DDoS Attacks

    Sponsored by: Arbor Networks

    In this e-guide learn of recent DDoS attacks on organizations, how botnets are getting bigger and stronger, and the true cost of being targeted by one of these attacks.

  • How to Use an Incident Response Policy to Better Collaborate

    Sponsored by: Delta Risk

    In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.

  • Why So Many Enterprises Lack Proper Authentication Methods

    Sponsored by: RSA Softcat

    Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.

  • How to Mitigate Shadow Cloud Services Security Risks

    Sponsored by: IBM

    Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: IBM

    Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

  • Recovering From Ransomware Starts with a Data Protection Strategy

    Sponsored by: Dell Software

    Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.

  • How to Protect Data from Ransomware

    Sponsored by: Dell Software

    It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.

  • Get the Most Out of Your SIEM System

    Sponsored by: Trustwave

    SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.

  • Importance of Incident Response Collaboration

    Sponsored by: Dimension Data

    This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.

  • Protect Yourself From Antivirus

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • From DevOps to DevSecOps: Integrating Security

    Sponsored by: BMC

    They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.

  • How Etsy's DevOps Teams Fend off Fraudsters

    Sponsored by: BMC

    In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.

  • IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy

    Sponsored by: Aruba Networks

    The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.

  • How to Secure Azure and Recover From the Worst Disasters

    Sponsored by: Softchoice Corporation

    In this e-guide, expert Rob Shapland breaks down how two new Microsoft Azure features aim to boost cloud security for enterprises. Learn how to keep Azure secure and keep your business going if disaster strikes and the worst is realized.

  • The Current Landscape of Advanced Persistent Threats

    Sponsored by: Proofpoint

    In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.