ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Healthcare Cybersecurity Best Practices

    Sponsored by: ServiceNow

    In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.

  • Security Challenges in Healthcare Social Media Usage

    Sponsored by: Actiance

    In this e-guide, Jeani Park, senior director at an Internet and mobile device monitoring company, answers questions about security challenges that healthcare organizations face when it comes to social media. Discover best practices for governing use of social media in a hospital or practice so that you can ensure patient information stays secure.

  • Buyer's Essentials: What to Look for in Single Sign-On Technology

    Sponsored by: TechTarget Health IT

    Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.

  • Recognize Your Security Shortcomings and Address Them with Confidence

    Sponsored by: Dell, Inc. and Intel®

    This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.

  • An Introduction to Microsoft Office 365 and Email Security Tools

    Sponsored by: Solarwinds MSP

    In this e-guide, expert Dave Shackleford discusses the security pros and cons of Microsoft Office 365's cloud-based productivity suite. You'll also find a section on email security, including helpful information about choosing between on-premise email security tools, or embracing the cloud.

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: TechTarget Security

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • It's time to tackle IoT security

    Sponsored by: RUCKUS Networks

    The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.

  • Protecting Patient Data in the Mobile Era

    Sponsored by: TechTarget Health IT

    The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.

  • Dispelling the Shadows Cast Over IT Security

    Sponsored by: Cisco Umbrella

    This guide discusses two shadows that are being cast over IT security. Domain shadowing, and shadow IT. By learning about these two threats, you'll be better equipped to ensure that you won't face crippling attack down the line.

  • Security: Communicating to the Board of Directors and Evaluating Vendors' Promises

    Sponsored by: BitSight

    This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.

  • The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data

    Sponsored by: UnitedLex

    Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.

  • Advanced Persistent Threat Detection: Can It Find Custom Malware?

    Sponsored by: UnitedLex

    A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: UnitedLex

    While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.

  • The Need-to-Know of Today's Cloud Security

    Sponsored by: TechTarget Cloud Computing

    In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.

  • Open Source Strategies Spark Security and Integration Concerns

    Sponsored by: Black Duck Software

    In this e-guide, experts discuss the importance of moving past security concerns with open source strategies. Find out how your enterprise can keep your infrastructure secure with open source strategies so that you can meet your high-performance needs.

  • How to Evaluate UCaaS Providers' Security Measures

    Sponsored by: Carousel Industries

    This e-guide discusses ways you can address the security concerns of UCaaS, including multi-tenancy and encryption. It goes on to provide ways you can evaluate the security measures that potential UCaaS vendors are building into their services.

  • The Making of a Cloud Security Culture

    Sponsored by: Trend Micro, Inc.

    This e-guide emphasizes the importance of cultivating a cloud security culture and discusses the key benefits and differences between public and hybrid cloud. Access now to learn how your organization can achieve a secure cloud environment.

  • Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability

    Sponsored by: Symantec Website Security

    In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.

  • SSL Certificate Management: How to Avoid Common Mistakes

    Sponsored by: Symantec Website Security

    This expert e-guide describes the most common SSL certificate management mistakes and provides advice on how to avoid them. Discover how to choose the best certificates for your enterprise's needs, manage renewal of certificates, and more.

  • Encryption's Risks, Benefits, and Roles in SSL Attacks

    Sponsored by: Symantec Website Security

    In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.

  • How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences

    Sponsored by: Symantec Website Security

    This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.

  • Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.

  • Breaking the Cyber Attack Lifecycle

    Sponsored by: Palo Alto Networks

    This white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.

  • Endpoint Security Management: Beyond Antivirus

    Sponsored by: TechTarget Security

    Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.

  • Protecting Data on the Go

    Sponsored by: TechTarget Security

    This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.