ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Application security: More important than ever

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • The rise of the MSSP

    Sponsored by: MicroScope

    In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.

  • IT Priorities 2018 - What's happening in security?

    Sponsored by: ComputerWeekly.com

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

  • Data protection: A business imperative

    Sponsored by: ComputerWeekly.com

    In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.

  • Infosec culture: A former helicopter pilot's perspective

    Sponsored by: ComputerWeekly.com

    In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.

  • CW ASEAN: Time to dial up defences

    Sponsored by: ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

  • Mobile security moving to a unified approach

    Sponsored by: ComputerWeekly.com

    This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

  • Computer Weekly – 27 February 2018: How IT is taking UPS to new heights

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to UPS CIO Juan Perez to find out how making his IT department "business intimate" is driving innovation. We look at how cloud management platforms can help ease the adoption of multiple public cloud services. And we examine how UK local councils are struggling to deal with cyber attacks. Read the issue now.

  • CW Nordics ezine February 2018

    Sponsored by: ComputerWeekly.com

    In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

  • Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.

  • Benefits of Enterprise File-Sync-and-Share Tools

    Sponsored by: Dropbox

    Neither transparency nor security can suffer at the expense of the other, which means IT and security teams could benefit from file-sync-and-share tools. This expert guide details the benefits of enterprise file-sync-and-share software, and the 10 risks you run when you don't use them.

  • Fundamentals of Endpoint Security: Anti-Malware Protection

    Sponsored by: Citrix

    Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.

  • Ins and Outs of Setting up a SOC

    Sponsored by: Respond Software

    Find out why a security operations center (SOC) can be a valuable part of your organization's cybersecurity strategy. Learn how to set one up, from the 3 types of SOC employees needed to core principles that organizations should follow when setting up their SOC.

  • How to Make the Most of your Detection and Response

    Sponsored by: Respond Software

    Learn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.

  • Adapt Security for Hybrid Cloud Environments

    Sponsored by: Citrix

    In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.

  • Automation in Cybersecurity

    Sponsored by: Juniper Networks

    During his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.

  • New Cloud Threats to Watch Out for in 2018

    Sponsored by: Juniper Networks

    Safeguarding your critical data is getting harder as threat actors embrace the advantages, and missteps, of cloud. Inside this expert guide, Kathleen Richards details what to watch out for in 2018.

  • Information Security: Companies Aren't the Only Ones Migrating to Cloud

    Sponsored by: SearchSecurity.com

    Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.

  • The time is ripe to implement cybersecurity automation

    Sponsored by: SearchSecurity.com

    It's past time to implement cybersecurity automation. Learn what automation can do for your IT defenses and how to get started in our latest handbook.

  • Mobile security trends point to unifying policy and tools

    Sponsored by: SearchSecurity.com

    Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management.

  • 5 Overlooked Windows 10 Security Risks

    Sponsored by: VMware

    Windows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook.

  • Five Principles for Securing DevOps

    Sponsored by: Veracode, Inc.

    Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.

  • Botnet attacks are evolving; your defenses must too

    Sponsored by: AppGuard

    Botnet attacks will expand and evolve. The best way to fight back is to stop searching for the perfect botnet-protection tool and layer defenses instead.

  • How to update, automate your IR processes

    Sponsored by: Booz Allen Hamilton

    In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.