ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Utility Regulations Demand Robust Third-Party Risk Management

    Sponsored by: BitSight

    In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.

  • Personnel Administration and Security Solution for Federal Agencies

    Sponsored by: Appian

    In this white paper, learn how the Appian Personnel Administration and Security Solution (PASS) can help create a unified view of people and investigations in order to improve the efficiency and effectiveness of personnel security administration.

  • Tackling the Visibility Gap in Information Security

    Sponsored by: ReliaQuest

    Read on to uncover the most tangible pain points in security management and the emerging mandate required from people, processes and technology to continue optimizing threat protection.

  • The Risk Initiative: Building a Business Case with Mitigation ROI

    Sponsored by: Cyber-Ark Software

    CyberArk launched a multi-part research project "The Risk Initiative: Building a Business Case with Mitigation ROI" which is designed to investigate how cybersecurity professionals can mature their programs to move towards ROI-centric decision-making. Download this research report to explore key findings.

  • Cybersecurity Trailblazers Make Security Intrinsic to Their Business

    Sponsored by: VMware

    In this e-book, find suggestions for improving your enterprises' security posture, based on lessons learned from the cybersecurity trailblazers and executives interviewed for this report.

  • Data Protection by Design

    Sponsored by: Immuta, Inc

    Data Protection by Design (DPbD) is the core data protection requirement introduced by the GDPR. And yet despite DPbD's centrality to the GDPR, it receives scant attention. Why? It's quite difficult to implement because it consists of many different requirements. In this white paper, explore what the DPbD is and why it's central to the GDPR.

  • Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

    Sponsored by: LexisNexis Risk Solutions

    In this eBook, discover the top 10 anti-fraud tips on how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.

  • 3 Steps to Securing Enterprise Data on Cloud Platforms

    Sponsored by: ReliaQuest

    Enterprises have leveraged cloud platforms to facilitate web applications for years. However, many organizations that move to cloud platforms mistakenly assume that the cloud provider delivers sufficient visibility and monitoring. In this white paper, explore 3 steps that can help you properly secure your enterprise data on cloud platforms.

  • What Makes a Standalone IPS so Effective?

    Sponsored by: Trend Micro, Inc.

    In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.

  • CW ASEAN: Trend Watch – Security

    Sponsored by: ComputerWeekly.com

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

  • THE THREE PHASES OF SECURING PRIVILEGED ACCOUNTS

    Sponsored by: Cyber-Ark Software

    In this white paper, discover the 3 phases of securing privileged accounts and which action may benefit an organization the most.

  • Everything You Always Wanted to Know About Security at the Edge, But Were Afraid to Ask

    Sponsored by: Akamai

    There used to be a constant immovable security perimeter but, the perimeter as we know it is dissolving. Now, organizations need to protect everything inside their data center by deploying security at the edge. In this white paper, learn everything you need to know about employing an edge security strategy.

  • 3 Tenets of Security Protection for State and Local Government and Education (SLED)

    Sponsored by: Dell EMC

    Security is the utmost priority for IT decision-makers in government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data. In this resource, explore important factors to consider when incorporating security into IT modernization initiatives.

  • Market Guide for Security Orchestration, Automation and Response Solutions

    Sponsored by: Swimlane

    In this Gartner research report, learn about security orchestration, automation and response solutions to help improve security operations centers.

  • Breach Detection Systems Test Report

    Sponsored by: Trend Micro, Inc.

    NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000. In this Breach Detection System Test Report, explore the Deep Discover Inspector's security effectiveness, network performance and more.

  • A Check Point Mobile Threat Research Report: Mobile Cyberattacks Impact Every Business

    Sponsored by: Checkpoint Software Technologies

    In this Check Point mobile threat research report, discover the key findings about how mobile cyberattacks impact every business.

  • Prevent Targeted Data Breaches With 8 Steps

    Sponsored by: Checkpoint Software Technologies

    Organizations need to take cybersecurity seriously, especially as data breach attacks become more targeted, evasive and lucrative. Too often businesses discover their vulnerabilities after a breach has occurred. In this white paper, explore the current data breach attack landscape and 8 steps you can take to proactively prevent them.

  • A Cybersecurity Guide for Executives: Putting The Cyberlandscape In Perspective

    Sponsored by: Checkpoint Software Technologies

    We've come a long way from the days when cybersecurity was the job of the IT Director. Today, there is consensus that not only does it need to be a top priority for organizations, but that executives must be accountable. This white paper will walk you through the key areas to focus on and the actions to take to secure your organization.

  • 5 Signs of Malicious Activity Your Organization May Be Overlooking

    Sponsored by: Farsight Security

    If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • Critical Steps to a More Secure Mobile Environment in 2019

    Sponsored by: Vox Mobile Solutions

    In this check list, discover the 10 crucial steps to achieve a more secure mobile environment in 2019.

  • Managed Security for MSPs

    Sponsored by: SkOUT

    Read this white paper to learn how to provide viable cybersecurity monitoring solutions for your customers, how to successfully evolve the SOC, and how to potentially transition to an MSSP.

  • 2019 IT Guide: Securing Email

    Sponsored by: Inky Technology

    Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.

  • The Four Pillars of Modern Vulnerability Management

    Sponsored by: Rapid7

    In this white paper, discover a comprehensive approach to reducing vulnerabilities across your ecosystem.

  • Why Training Is Not Enough to Stop Phishing Emails

    Sponsored by: Inky Technology

    According to the FBI, phishing-based email accounted for more than $12 billion in fraud in just the last 5 years. In this blog, learn how Inky Phish Fence can help your organization prevent phishing attacks by scanning every internal and external email.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.