ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Spending Research

  • MicroScope – February 2023: Opportunities in security

    Sponsored by: MicroScope

    In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it

  • Cyber Security: 2021 Worst in Show

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.

  • Security Think Tank: Biden's Cyber Security Plan

    Sponsored by: TechTarget ComputerWeekly.com

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

  • Spear Phishing: Top Threats and Trends Vol. 5

    Sponsored by: Barracuda

    As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.

  • Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”

    Sponsored by: Barracuda

    Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.

  • 5 steps to secure home devices & improve productivity for remote work

    Sponsored by: Barracuda

    Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.

  • Ransomware Threat Spotlight

    Sponsored by: Barracuda

    Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.

  • Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.

    Sponsored by: Barracuda

    Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.

  • Future-Proofing Enterprise Security Awareness in the Age of Workforce Mobility

    Sponsored by: Barracuda

    With enterprises gearing towards a more mobile workforce, security awareness is now more important than ever – and the trends behind it are crucial for IT professionals. To get a sense of the readiness of organizations in employee awareness and training, read this Forrester report to explore these trends, as well as priorities, in this space.

  • Brave the new normal: How companies in Asia-Pacific are overcoming security challenges in a remote workplace.

    Sponsored by: Barracuda

    According to a recent study, 62% of APAC organizations said they wouldn’t have implemented remote working for another 5 years if it weren’t for COVID-19. The rapid adoption of the new normal has left many of these organizations vulnerable – read this white paper to learn how APAC organizations are addressing these security challenges.

  • GoSecure Cybersecurity Perceptions Versus Reality

    Sponsored by: GoSecure

    This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.

  • Insights into attacker activity in compromised email accounts

    Sponsored by: Barracuda

    Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.

  • STEP 2: A Guide to Setting Up Your Insider Threat Management Program

    Sponsored by: Proofpoint

    In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.

  • Five Pillars of an actionable Cloud Security Framework in Azure

    Sponsored by: Barracuda

    In order to ensure a responsible cloud migration, organizations need to ensure that they secure the network, applications and data that will reside in their cloud environment. This white paper takes the widely used NIST Cybersecurity Framework and turns it into 5 actionable pillars. Read on to get started.

  • Solving the Challenges of Modern Remote Access

    Sponsored by: Barracuda

    The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.

  • Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks

    Sponsored by: Barracuda

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

  • 7 Ways to Take Cybersecurity to New Levels

    Sponsored by: Cisco Secure

    Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.

  • A guide to build vs. buy service models for threat detection and response

    Sponsored by: AT&T Cybersecurity

    Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.

  • Enable and Secure Remote Work During the COVID-19 Pandemic

    Sponsored by: Barracuda

    The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.

  • CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Tech-Savvy English Public School Streamlines Office 365 Security

    Sponsored by: Barracuda

    Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.

  • Cyber Security: 2021 Worst in Show

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.

  • Security Think Tank: Biden's Cyber Security Plan

    Sponsored by: TechTarget ComputerWeekly.com

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

  • SIEM, SOAR or both? Our security experts weigh in

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

  • Ponemon - Costs and Consequences of Gaps in Vulnerability Response

    Sponsored by: ServiceNow

    Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.