ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • CIO Trends #6: Nordics

    Sponsored by: ComputerWeekly.com

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • CW Benelux November 2017

    Sponsored by: ComputerWeekly.com

    The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.

  • Security Analytics:A popular addition to cyber defence arsenals

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • CW Nordics August 2017

    Sponsored by: ComputerWeekly.com

    The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.

  • SME security - a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • How SMBs are Changing their Security Tactics

    Sponsored by: Booz Allen Hamilton

    Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.

  • What GDPR privacy requirements mean for U.S. businesses

    Sponsored by: SearchSecurity.com

    Enforcement of the EU's new GDPR privacy regulations is imminent, and potential fines send a clear message to companies to protect their customers, or else.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: SearchSecurity.com

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • The Tug of War Between UBA and SIEM

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.

  • Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape

    Sponsored by: Juniper Networks, Inc.

    This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.

  • Buyers Guide: Network Security Management

    Sponsored by: Palo Alto Networks

    When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.

  • The Case for Modern SOCs

    Sponsored by: SearchSecurity.com

    In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.

  • What does a CISO do now? It's a changing, increasingly vital role

    Sponsored by: SearchSecurity.com

    What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.

  • Logrythm's Security Analytics Platform: Product Overview

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.

  • SIEM Analysis for Security Professionals

    Sponsored by: LogRhythm, Inc.

    This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.

  • Managing Access to Keep Privileged Users' Credentials Secure

    Sponsored by: SearchSecurity.com

    Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list.

  • Why Security in DevOps is Essential to Software Development

    Sponsored by: SearchSecurity.com

    What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.

  • How to Increase Security for your Login on Mobile Applications

    Sponsored by: IBM

    In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.

  • Owner-controlled PKI: The Next Step in Securing IoT

    Sponsored by: DigiCert

    Learn how owner-operated PKI is making strides in becoming the most secure option for IoT users.

  • How to Find the Best DDoS Attack Prevention and Detection Tools

    Sponsored by: SearchSecurity.com

    Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • How to Bolster Endpoint Security Protection

    Sponsored by: Symantec

    This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.