Security Infrastructure Research
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
Sponsored by: ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
Cyber Security: 2021 Worst in Show
Sponsored by: ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
How do you solve a problem like security training?
Sponsored by: ComputerWeekly.comIn this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
Security Think Tank: Biden's Cyber Security Plan
Sponsored by: ComputerWeekly.comAs Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
-
Measuring the ROI of Security Orchestration and Response Platforms
Sponsored by: SplunkSecurity orchestration and response (SOAR) platforms have become the force multiplier needed to unlock the full power of an organization’s security investment by helping security teams focus on innovation rather than mundane tasks. Read this white paper to measure the ROI of SOAR.
-
CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator
Sponsored by: ComputerWeekly.comThe European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
-
Retiring Web Access Management (Wam)
Sponsored by: OktaMany organizations have adopted web access management (WAM) solutions to secure access to web applications on-premises. But with the emergence of SaaS, mobile apps and IaaS, enabling access to all systems and users has broken the WAM security model. Take a look at this data sheet to learn how to modernize identity management.
-
7 Experts on Transitioning to MDR
Sponsored by: GoSecureManaged detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
-
SIG - SASE in 15 minutes
Sponsored by: Cisco UmbrellaSecure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
-
Internal Firewalls
Sponsored by: VMwareAlthough some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.
-
Burdens Of Homegrown Customer Identity That Hinder Digital Transformation
Sponsored by: OktaWhen your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.
-
Security White Paper Data Security Is Serious Business.
Sponsored by: AlchemerThe digital landscape is constantly evolving – which necessitates changes and improvements to security tactics and controls. This white paper highlights the key tenets and capabilities of Alchemer’s information security program – read on to enhance your understanding.
-
Okta + HYPR: Secure, Passwordless Authentication for Employees and Consumers
Sponsored by: OktaPasswords present a significant weakness in an organization’s security architecture, and cybercriminals are keen on exploiting this weakness. Read this data sheet to learn how Okta and HYPR are enabling organizations to eliminate passwords in favor of passwordless authentication methods.
-
Case Study: Archdiocese
Sponsored by: BitdefenderThe Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.
-
CISSP Exam Guide: Chapter 1: Security and Risk Management
Sponsored by: McGraw HillIn this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
Sponsored by: ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
Application Security Stats Flash
Sponsored by: WhiteHat SecurityAPI-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.
-
Evaluating Data-centric Protection Solutions
Sponsored by: Comforte AGData is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
-
A Security Engineer’s Nightmare
Sponsored by: Cribl.ioFor security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
-
Enable and Educate Your Team
Sponsored by: WhiteHat SecurityToo many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.
-
Bridge your Executive Team
Sponsored by: WhiteHat SecurityApplication security is becoming increasingly important as applications play a more prominent role in driving today’s economy. Watch this webinar to learn more about the current state of AppSec, the challenges security teams are facing and how to get executive buy-in for AppSec initiatives.
-
Whitehat Security Webinar
Sponsored by: WhiteHat SecurityDynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.
-
Are Your Apps in the Race to Win?
Sponsored by: WhiteHat SecurityFor modern organizations, applications play a prominent role in both internal operations and interacting with end-users. As a result, application security has become critical. Watch this webinar to learn more about AppSec and why it’s critical for digital transformation initiatives.