ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • How long does it take to get owned?

    Sponsored by: TechTarget ComputerWeekly.com

    A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.

  • Jargon Buster Guide to Container Security

    Sponsored by: TechTarget ComputerWeekly.com

    The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.

  • Top 10 IT security stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Infographic: 6 emerging trends in security

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.

  • Jargon Buster Guide to Post Quantum Cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

  • CW ANZ: Fix the weak links

    Sponsored by: TechTarget ComputerWeekly.com

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

  • CW Middle East ezine July 2018

    Sponsored by: TechTarget ComputerWeekly.com

    What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.

  • Application security: More important than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • The rise of the MSSP

    Sponsored by: MicroScope

    In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.

  • The State of Cybersecurity and How It Will Evolve

    Sponsored by: ALTR

    Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.

  • Incident response playbook in flux as services, tools arrive

    Sponsored by: TechTarget Security

    The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.

  • Explore the Threat Hunting Process

    Sponsored by: TechTarget Security

    The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.

  • How Healthcare Organizations Can Combat Security Threats

    Sponsored by: Arctic Wolf

    Learn how your organization can meet compliance obligations while maintaining an optimal security strategy that detects and responds to advanced security threats.

  • Build Identity Verification Processes with the Power of AI

    Sponsored by: Jumio

    This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.

  • GETTING GDPR RIGHT

    Sponsored by: Attunity

    Today's businesses can no longer treat customer privacy as an afterthought. Without a singular mandated solution, companies need to create the right GDPR roadmap. Download this white paper to learn more.

  • Three Questions to Ask Before you Migrate Apps to the Public Cloud

    Sponsored by: Oracle Dyn

    Many firms assume public cloud is the best place to host all apps, but that's not always the case. Find out why in this essential guide.

  • Why Web Application Attacks are a Growing Threat to the Cloud

    Sponsored by: Oracle Dyn

    New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.

  • Cryptojacking Attacks May Not Challenge Ransomware Dominance

    Sponsored by: Cisco Umbrella

    Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.

  • Cryptojacking Emerging as a New Threat to Healthcare

    Sponsored by: Cisco Umbrella

    With the increasing trend of cryptojacking, organizations must take action against attackers looking to take advantage of their environment. Discover which appropriate steps you can take to fight cybercrime today.

  • 6 Ways to Prevent Ransomware in Health IT

    Sponsored by: Cisco Umbrella

    With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.

  • Get Smart About Threat Intel Tools and Services

    Sponsored by: TechTarget Security

    Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.

  • How to Make a SIEM System Comparison Before you Buy

    Sponsored by: TechTarget Security

    Considering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.

  • Cloud Security Pros Finding their Voice

    Sponsored by: Cavirin

    Find out how the DevSecOps and the NIST Cybersecurity Framework both put the long-lost co-worker, the security pro, front and center.

  • Benefits of Enterprise File-Sync-and-Share Tools

    Sponsored by: Dropbox

    Neither transparency nor security can suffer at the expense of the other, which means IT and security teams could benefit from file-sync-and-share tools. This expert guide details the benefits of enterprise file-sync-and-share software, and the 10 risks you run when you don't use them.

  • Fundamentals of Endpoint Security: Anti-Malware Protection

    Sponsored by: Citrix

    Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.