ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Does your AppSec Program Gen An A+?

    Sponsored by: WhiteHat Security

    Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.

  • Reduce API Security

    Sponsored by: WhiteHat Security

    Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.

  • Cybersecurity: It's a Team Sport

    Sponsored by: WhiteHat Security

    During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.

  • Why DevOps Has Not Become DevSecOps

    Sponsored by: WhiteHat Security

    Access this white paper to see the 6 myths that are contributing to the lack of DevSecOps adoption, watch as they are easily debunked, and learn 8 recommendations moving forward with this new understanding.

  • The State of Election Security

    Sponsored by: WhiteHat Security

    The topics of voter registration and election security were top-of-mind in 2020 – but what did we learn that we can use to better ourselves going forward? Watch this webinar, which overviews the state of election security, common threats, and best practices.

  • DevSecOps Framework

    Sponsored by: WhiteHat Security

    Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.

  • Surviving Beyond the New Normal: It's more than securing your remote workers

    Sponsored by: Okta

    In today’s organizations, directory structures need to be able to handle quick moves to new cloud applications and other systems. This means you need top-of-the-line identity management. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD and how Okta’s modern identity platform may be able to help.

  • Attacking And Defending A Distributed Workforce

    Sponsored by: ServiceNow

    The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.

  • Continuous Application Security with HCL AppScan

    Sponsored by: HCL Software

    This Enterprise Strategy Group (ESG) Technical Review highlights ESG’s evaluation of HCL AppScan and how it helps developers continuously secure applications. The review also discusses how to integrate AppScan into CI/CD pipelines and support other aspects of DevSecOps initiatives – read on for the full review.

  • Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.

  • Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.

  • Magic Quadrant for IT Vendor Risk Management Tools

    Sponsored by: ServiceNow

    IT vendor risk management (IT VRM) software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. This Gartner Magic Quadrant Report provides an overview of the IT VRM market and a comprehensive evaluation of the top offerings – read on to get started.

  • Magic Quadrant for IT Risk Management

    Sponsored by: ServiceNow

    IT risk management (ITRM) has emerged as a key pillar in assessing risk, bolstering security and addressing compliance needs. Read this Gartner Magic Quadrant Report for an in-depth comparison of the capabilities of top ITRM vendors and offerings in today’s market.

  • CEO Impersonation

    Sponsored by: Inky Technology

    Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.

  • Hidden Text and Zero Font Attacks

    Sponsored by: Inky Technology

    You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.

  • Invisible Characters

    Sponsored by: Inky Technology

    Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.

  • Zoom & Doom: How INKY Unraveled A Credential Harvesting Phishing Scam

    Sponsored by: Inky Technology

    Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.

  • Top COVID-19 Phishing Scams

    Sponsored by: Inky Technology

    Phishing scammers have taken advantage of the frequent updates regarding COVID-19 information to use it as an entry point for their campaigns. This article, Top COVID-19 Phishing Scams, looks at the emerging threat types and what to look for to identify an attack – read on to get started.

  • Understanding Phishing: Text Direction Deception!

    Sponsored by: Inky Technology

    Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.

  • Around the World in 34 Phish: Covid-19 Phishing Examples

    Sponsored by: Inky Technology

    The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.

  • GoSecure Cybersecurity Perceptions Versus Reality

    Sponsored by: GoSecure

    This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.

  • Web and Mobile Application Security Testing Solution Brief

    Sponsored by: WhiteHat Security

    According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.

  • The Cisco Umbrella Advantage

    Sponsored by: Cisco Umbrella

    Today, the network perimeter is expanding and blurring. Remote workers are bypassing the VPN and data is bypassing perimeter security. Traditional security just can’t keep up. In this e-book, learn how Cisco Umbrella DNS-layer security can help you see and block threats before they ever reach your network or endpoints.

  • The Business Case for Cloud Threat Defense

    Sponsored by: Palo Alto Networks

    In order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.

  • Ponemon - Costs and Consequences of Gaps in Vulnerability Response

    Sponsored by: ServiceNow

    Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.