Research Library

Powered by

Security Policies Research

  • The General Data Protection Regulation (GDPR) is Here

    Sponsored by: BackOffice Associates

    In this webcast hear from Enza Iannopollo, Security & Risk analyst at Forrester Research, as she demonstrates how to get started on building a risk management policy that will best suit the needs of your company.

  • The Second Annual Study on the Cyber Resilient Organization

    Sponsored by: IBM Resilient

    In this Ponemon Institute report, take a look at organizations that believe they have achieved a very high level of cyber resilience and compare them to organizations that believe they have achieved only an average level of cyber resilience.

  • CW ASEAN - March 2018: Time to dial up defences

    Sponsored by:

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

  • CW ANZ - March 2018: Report data break-ins - it's the law

    Sponsored by:

    Cyber security is an increasingly global endeavour with threat actors who know no boundaries unleashing attacks from nearly anywhere in the world. In this month's issue of CW ANZ, we look at how Australia's mandatory data breach notification law underscores recent efforts to lift its cyber security game.

  • Create Trusted IoT, Become the King of Sweden?

    Sponsored by: Radware

    Click inside to learn about the opportunities providers have to secure vulnerabilities in IoT devices that may have been overlooked by manufacturers.

  • Is My Smart Home Telling People What I Do Every Day?

    Sponsored by: Radware

    Click inside to learn about the current state of smart home security, as well as some steps providers should take in the near future to protect their customers.

  • Orchestrating SDN Flows for Cybersecurity

    Sponsored by: Radware

    Click inside to learn how the orchestration capabilities of SDN could be use to fight, and even prevent DDos attacks in the future.

  • The Five Essential Capabilities Of An Analytics-Driven SOC

    Sponsored by: Splunk

    This white paper outlines how you can gain visibility into potential vulnerabilities by adopting an analytics-driven SOC. Read on to find 5 capabilities that are "must-haves" in this type of system.

  • The Enterprise Cybersecurity and Compliance Challenge

    Sponsored by: Mimecast

    Click inside to learn the 3 trends Australian IT leaders have identified as the most critical to cybersecurity, as well as what new security measures organizations are considering.

  • Identifying and Protecting Critical Value Data

    Sponsored by: Nuix

    Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.

  • CW Nordics ezine February 2018

    Sponsored by:

    In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.

  • Crafting a Cybersecurity Incident Response Plan, Step by Step

    Sponsored by:

    Is your cybersecurity incident response plan the best it can be? Inside this expert handbook, Johna Till Johnson, Rob Shapland and Mike Villegas uncover step by step instructions to crafting an effective incident response plan and cloud incident response plan for your organization.

  • Achieve Effective PCI Compliance by Automating Required Controls and Processes

    Sponsored by: Skybox Security

    Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.

  • What is Attribute-Based Access Control?

    Sponsored by: Axiomatics

    Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.

  • Bell Helicopter Enables Attribute-Based Access Control and Authorization

    Sponsored by: Axiomatics

    In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.

  • CW Benelux February 2018

    Sponsored by:

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

  • Deploying and Managing Security in the Cloud

    Sponsored by: Forcepoint

    As more organizations continue to store sensitive data in the cloud, traditional perimeter based security approaches are no longer viable. But what should replace them? Read this Osterman Research white paper to find out what new security issues the cloud creates, some best practices for protecting sensitive data, and more.

  • Rethinking Data Security

    Sponsored by: Forcepoint

    Read this white paper to find out what new security concerns are driving the need for risk adaptive protection. Then learn about a data protection method that focuses on people for visibility into the data they create and the applications they use.

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    Sponsored by:

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

  • Software as a SIEM: Improve Your Security Posture by Using Splunk as your SIEM

    Sponsored by: Splunk

    Businesses now require tools that can be used for rapid response detection, incident investigation and coordination of CSIRT breach scenarios. A tool, like Splunk software. Read this white paper and explore what this innovative SIEM has to offer.

  • Four CISO Tribes and Where to Find Them

    Sponsored by: Synopsys

    In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.

  • Your Chance to Get It Right: Five Keys to Building AppSec into DevOps

    Sponsored by: Veracode, Inc.

    Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.

  • The Building Security in Maturity Model Examined

    Sponsored by: Synopsys

    In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.

  • How to Create a Scalable Threat Model

    Sponsored by: Synopsys

    Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.

  • CIO Trends #6: Nordics

    Sponsored by:

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.