ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Who Owns Cloud Security?

    Sponsored by: OneNeck IT

    As cybersecurity risks become more numerous, sophisticated and expensive, businesses are scrambling to fortify their defenses and running into an important question: Who actually owns cloud security? Download this white paper to find out.

  • Top 5 Security Trends to Watch

    Sponsored by: CenturyLink

    Cybercrime is continuing to evolve, and cybercriminals are developing new ways to target businesses across the globe. In this infographic, explore current trends that CenturyLink believes organizations should be aware of today to help keep themselves secure.

  • Automation Is a Security Pro’s Best Friend

    Sponsored by: FireMon

    The benefits of automation are universal no matter your industry. In this infographic, learn 7 reasons why automation is a security pro’s best friend including its ability to remove the manual tasks that often result in human error.

  • Application security: best practices and risks

    Sponsored by: ComputerWeekly.com

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

  • Introduction to DevSecOps

    Sponsored by: Contrast Security

    Gartner has named DevSecOps one of their fastest-growing areas of interest and predicts that DevSecOps will be embedded into 80% of rapid development teams by 2021. In this white paper, explore 4 core practices to any DevSecOps initiative.

  • Security for Microservices: Best Practices

    Sponsored by: Aporeto

    Moving to a microservices framework and adoption of cloud-native services introduces new security considerations for developers, line-of-business owners, and security teams. In this white paper, explore best practices for security in a microservices environment.

  • Understanding the Mobile Threat Landscape

    Sponsored by: IBM

    With more web traffic now taking place on mobile than desktop, scammers are taking note by hitting victims with regular device-centric scams that leverage popular apps. In this report, explore the key mobile security trends that emerged last year. Also, uncover predictions for the mobile threat landscape in the years ahead.

  • Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Sponsored by: HackerOne

    Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.

  • GandCrab Ransomware Analysis Report

    Sponsored by: Versa Networks

    A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.

  • Channel Security Experts Deep Dive: The Anatomy of an MSP Breach

    Sponsored by: Datto, Inc.

    In the following webinar, Channel security experts dig further into the anatomy of MSP breaches. Tune in to join the discussion on the state of cybersecurity in the IT channel, low to zero cost tactics that improve MSP cyber defenses, and more.

  • Web App Firewall Webinar

    Sponsored by: Tala Security

    In the past couple of years, organizations have seen a spike in attacks that are focused on getting malicious crypto into the browser in order to exfiltrate data. In this video, Aanand Krishnan from Tala Security discusses how your organization is exposed to web application attacks on the browser side and how to protect your organization.

  • How Machine Learning Can Help You Keep up with Current Threats

    Sponsored by: Appian

    Can AI and machine learning (ML) systems actually help solve IT security problems and protect against threats moving forward? Download this e-guide for more expert insights into the potential AI and ML can bring to your organization’s proactive security measures.

  • A Computer Weekly buyer's guide to blockchain technology

    Sponsored by: ComputerWeekly.com

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • 5 Best Practices in Cloud Security for Aviation

    Sponsored by: ShieldX

    It can be challenging for all industries, including aviation, to apply conventional information security principles to the cloud. This white paper outlines 5 best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud.

  • Securing Office 365 Against Data Loss and Advanced Threats

    Sponsored by: Datto, Inc.

    Learn how to establish complete and comprehensive Office 365 data protection for your customers by tuning into this webcast. Topics covered include: Office 365 native protection vs. what falls under your jurisdiction, how to painlessly restore lost user data, and more.

  • The Business Guide to Ransomware

    Sponsored by: Datto, Inc.

    Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.

  • Ransomware Made MSPeasy: The MSP’s Guide to Saving the Day

    Sponsored by: Datto, Inc.

    Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.

  • Web Application Firewall Vendor Comparison Report

    Sponsored by: Barracuda

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

  • Harnessing Containers for the Big Data Era

    Sponsored by: Aporeto

    With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.

  • The Essential Cybersecurity Toolkit for SMBs

    Sponsored by: Datto, Inc.

    The following e-book demonstrates practical advice and easy tips for training employees on cybersecurity and industry best practices. Download now for guidance on how to spot a cyber-scam, 4 must-haves for a layered cybersecurity approach, and more.

  • Morphisec 2019 Hospitality Guest Cybersecurity Threat Index

    Sponsored by: Morphisec, Inc.

    As Morphisec continues to assist hospitality providers with improving defenses and protecting customer financial data and personal information, they decided to examine how the threat of cyberattacks is impacting the mindset of consumers. Download Morphisec’s 2019 Hospitality Guest Cybersecurity Threat Index report to see what they found.

  • RMM & Patch Management: The First Line of Defense Against Cyber Threats

    Sponsored by: Datto, Inc.

    Read the following paper to examine why remote monitoring and management (RMM) and patch management offer a strong defense against cyber threats like ransomware, as well as the benefits of building out these services as an MSP.

  • Cybercrime The New Downtime Threat to SMBs

    Sponsored by: Avast Software

    A growing number of small to medium-sized businesses are falling victim to cybercrime. However, not all SMBs are aware of the risks and implications. In this infographic, learn why SMBs need a proactive security strategy that includes services that protect data, devices and people to eliminate gaps in protection.

  • Top 5 Reasons Why Savvy MSPs Are Adopting Managed Security Services

    Sponsored by: Avast Software

    Small and medium-sized businesses (SMBs) are under attack by a variety of cyberthreats, but these organizations either do not realize how vulnerable they are or do not have the necessary time, resources, or skills to address the issues. This white paper introduces managed security services as a key strategy for evolving your business.

  • The Rise of Email Threats

    Sponsored by: Barracuda

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.