ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Top 3 Challenges Your Team Faces when Building in the Cloud

    Sponsored by: TrendMicro

    In the pages ahead, delve into the 3 major challenges that security teams face when moving into the cloud so that you know how to avoid or overcome them on your path to cloud adoption.

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • Protecting Users and Data with Cloud Security

    Sponsored by: Cisco Umbrella

    In this e-book, learn more about how your educational institution can build a holistic, multi-layer defense against ransomware attacks (especially in regards to protecting against email and Web-based threats).

  • Security and Compliance Strategies for Success

    Sponsored by: Citrix

    Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.

  • Analytical Stories: How I Learned to Stop Worrying and Respond to Threats

    Sponsored by: Splunk

    This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.

  • The Human Side of IT Security

    Sponsored by: Dell EMC and Microsoft

    Humans will never be perfect, and human error can often lead to costly data breaches. It is for this reason, that many companies are going beyond simply investing in more expensive technology to solve their security issues, but also putting the strategies you can read about in this white paper to work to create a "culture of security".

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • A 5 Minute Guide to Security for Cognitive Search and Knowledge Management

    Sponsored by: Attivio, Inc.

    Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • The Essential Checklist: A Practical Guide to Efficient Security Response

    Sponsored by: ServiceNow

    Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.

  • Cybersecurity — Whose Responsibility Is It?

    Sponsored by: Armor

    Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.

  • Yelp Customer Story: Secure Content with Threat Intelligence and Automated Protection

    Sponsored by: Cisco Umbrella

    Discover how Yelp fosters trust between their users and its online content by preempting potentially dangerous malware attacks and other threats with cloud-delivered automated protection and integrated threat intelligence.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • What You Need to Know About the General Data Protection Regulation (GDPR)

    Sponsored by: Rapid7

    In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.

  • The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure

    Sponsored by: Google Cloud

    Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.

  • 4 Steps That Help You Protect Your Business

    Sponsored by: Ricoh - HarveyDavid

    As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.

  • GDPR Breach Notification Rule Could Complicate Compliance

    Sponsored by: Lepide Software

    Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.

  • How You can Secure the Use of Cloud Apps and Services

    Sponsored by: Symantec

    Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.

  • How Should Companies Across the Globe Prepare for EU GDPR Compliance?

    Sponsored by: Commvault

    As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance

  • Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network

    Sponsored by: nCircle

    This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • The Role of Automation in Optimizing Network Performance and Security

    Sponsored by: FireMon

    As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.

  • Enterprise Defense at the Speed of Data

    Sponsored by: ThreatConnect

    Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.

  • Internet Security Threat Report

    Sponsored by: Symantec

    In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.

  • How to Become a Superstar Security Leader

    Sponsored by: Google Cloud

    Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.