ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018

    Sponsored by: Security Scorecard

    According to Forrester's survey, only 14% of respondents are confident that they effectively track all of their third parties. Cybersecurity risk rating solutions can help by automating the collection and analysis of third-party risk data. In this report, Forrester identifies the 9 most significant cybersecurity risk rating solution providers.

  • Corelight Webcast: New SIEM on the Block -- Meet Humio

    Sponsored by: CoreLight

    Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.

  • Top 10 IT security stories of 2018

    Sponsored by: ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Predictive Analytics in Defense and Security

    Sponsored by: Dataiku

    Data is growing exponentially, but insights from that data are growing linearly because people alone can't keep up. This is where machine learning and AI come in to play. This e-book details the challenges you'll face in defense and security, and offers a powerful solution.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • SOC-as-a-Service versus DIY SOC

    Sponsored by: Arctic Wolf

    Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.

  • State of the Channel Ransomware Report: Canadian Edition

    Sponsored by: Datto, Inc.

    More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.

  • To SIEM or Not to SIEM, Find Out Your Options

    Sponsored by: Arctic Wolf

    With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).

  • The Values of Both Building Your Own SOC and Buying SOC-as-a-Service

    Sponsored by: Arctic Wolf

    SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.

  • Infographic: 6 emerging trends in security

    Sponsored by: ComputerWeekly.com

    In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.

  • The SIEM that Gives SIEM a Good Name

    Sponsored by: Empow Cyber Security

    Learn how your organization can achieve reduced alert noise, real-time threat monitoring, automated decision-making investigation, and more with this SIEM platform.

  • Bringing Security to the Perimeter of your Cloud Network

    Sponsored by: Cisco Umbrella

    With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.

  • How Yelp Securely Connects People with Great Local Businesses

    Sponsored by: Cisco Umbrella

    At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.

  • Using & Protecting Microservices: A Double-edged Sword

    Sponsored by: ThreatX

    Microservices and containers are a hot topic right now. While they are making news because of ease of use, there are also challenges associated with protecting them. Read this blog post by Andrew Useckas, CTO of ThreatX to learn about a Web Application Firewall platform that can help secure your microservices.

  • Defending Your Network from Cryptomining

    Sponsored by: Cisco Umbrella

    Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.

  • Latest Cyber Security Strategies in ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.

  • CW Nordics August 2018

    Sponsored by: ComputerWeekly.com

    In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.

  • The Essential Guide to Security

    Sponsored by: Splunk

    With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.

  • Application security: More important than ever

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • Think beyond the traditional approach to security

    Sponsored by: Cylance

    Always being a step behind the hackers is a losing battle – it's time to think beyond the traditional approach of security and consider a new prevention strategy.

  • CW Nordics ezine February 2018

    Sponsored by: ComputerWeekly.com

    In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.

  • CW Benelux February 2018

    Sponsored by: ComputerWeekly.com

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

  • Getting the Board on Board with Application Security

    Sponsored by: WhiteHat Security

    CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.

  • Integrating IAM into your Digital Workspace

    Sponsored by: Citrix

    Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.

  • Ins and Outs of Setting up a SOC

    Sponsored by: Respond Software

    Find out why a security operations center (SOC) can be a valuable part of your organization's cybersecurity strategy. Learn how to set one up, from the 3 types of SOC employees needed to core principles that organizations should follow when setting up their SOC.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.