ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.

  • Retiring Web Access Management (Wam)

    Sponsored by: Okta

    Many organizations have adopted web access management (WAM) solutions to secure access to web applications on-premises. But with the emergence of SaaS, mobile apps and IaaS, enabling access to all systems and users has broken the WAM security model. Take a look at this data sheet to learn how to modernize identity management.

  • 7 Experts on Transitioning to MDR

    Sponsored by: GoSecure

    Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.

  • SIG - SASE in 15 minutes

    Sponsored by: Cisco Umbrella

    Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.

  • Internal Firewalls

    Sponsored by: VMware

    Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.

  • Burdens Of Homegrown Customer Identity That Hinder Digital Transformation

    Sponsored by: Okta

    When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.

  • Security White Paper Data Security Is Serious Business.

    Sponsored by: Alchemer

    The digital landscape is constantly evolving – which necessitates changes and improvements to security tactics and controls. This white paper highlights the key tenets and capabilities of Alchemer’s information security program – read on to enhance your understanding.

  • Okta + HYPR: Secure, Passwordless Authentication for Employees and Consumers

    Sponsored by: Okta

    Passwords present a significant weakness in an organization’s security architecture, and cybercriminals are keen on exploiting this weakness. Read this data sheet to learn how Okta and HYPR are enabling organizations to eliminate passwords in favor of passwordless authentication methods.

  • Case Study: Archdiocese

    Sponsored by: Bitdefender

    The Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.

  • CISSP Exam Guide: Chapter 1: Security and Risk Management

    Sponsored by: McGraw Hill

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Application Security Stats Flash

    Sponsored by: WhiteHat Security

    API-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.

  • Evaluating Data-centric Protection Solutions

    Sponsored by: Comforte AG

    Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.

  • A Security Engineer’s Nightmare

    Sponsored by: Cribl.io

    For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.

  • Are Your Apps in the Race to Win?

    Sponsored by: WhiteHat Security

    For modern organizations, applications play a prominent role in both internal operations and interacting with end-users. As a result, application security has become critical. Watch this webinar to learn more about AppSec and why it’s critical for digital transformation initiatives.

  • The State of Application Security

    Sponsored by: WhiteHat Security

    Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.

  • Women Building Careers in Cybersecurity

    Sponsored by: WhiteHat Security

    According to a recent study, women make up nearly half of the adult workforce in the US yet hold only a quarter of technology positions – a number that dwindles as you move up the leadership ladder. Watch this webinar and join a panel of women leaders in the tech industry as they discuss their experiences, challenges and accomplishments.

  • Whitehat Security Webinar

    Sponsored by: WhiteHat Security

    Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.

  • Enable and Educate Your Team

    Sponsored by: WhiteHat Security

    Too many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.

  • Bridge your Executive Team

    Sponsored by: WhiteHat Security

    Application security is becoming increasingly important as applications play a more prominent role in driving today’s economy. Watch this webinar to learn more about the current state of AppSec, the challenges security teams are facing and how to get executive buy-in for AppSec initiatives.

  • Addressing Complexity and Expertise in Application Security Testing

    Sponsored by: WhiteHat Security

    The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.

  • Security in the Fast Lane

    Sponsored by: WhiteHat Security

    Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.

  • How a Top Financial Firm Scaled Their Application Security Program & Accelerated Their Digital Transformation

    Sponsored by: WhiteHat Security

    A top 10 U.S. bank was faced with the challenges of scaling application security automation, regulatory compliance and triaging false positives from an automated scanner. And after factoring in time and budget constraints, it’s clear that this was a tall mountain to climb. Read this case study to see how they reached the top.

  • How a Northeastern State Strengthened Application Security for their Voter Registration System

    Sponsored by: WhiteHat Security

    Elections are very heavily targeted by threat actors. Troublemakers as they are, these actors will go to great lengths to breach voter privacy, even by accessing user information to impersonate voters. One state recognized this and wanted to ensure the security of their voter registration apps. See this case study to learn how they did it.

  • Detecting and Defending Against SSRF

    Sponsored by: WhiteHat Security

    Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.