ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Spending Research

  • CIO Trends #6: Nordics

    Sponsored by: ComputerWeekly.com

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.

  • Security Analytics

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • A Guide to Avoiding Financial Losses in Cybersecurity

    Sponsored by: Kaspersky Lab

    77% of U.S. businesses have suffered between 1 and 5 separate incidents of data loss, leakage or exposure in the past 12 months, according to Kaspersky Lab. This white paper reveals the financial woes across the threat landscape.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Sponsored by: ComputerWeekly.com

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

  • 10 Advantages of a Proxy Deployment with a Next-Generation Firewall

    Sponsored by: Symantec

    Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall

  • Six Criteria for Buying Data Loss Prevention Products

    Sponsored by: InteliSecure

    Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.

  • Introduction to Data Loss Prevention Tools

    Sponsored by: InteliSecure

    In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.

  • GDPR Compliance: From a Compliance Burden to a Security Opportunity

    Sponsored by: Symantec

    Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.

  • Turning GDPR Compliance into Data Security

    Sponsored by: Commvault

    Discover how to lay a solid foundation for holistic information governance and mitigate the burden of GDPR compliance

  • Your IIoT Security Plan: Risks in Manufacturing

    Sponsored by: Bayshore Networks

    In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.

  • IT Security Trends to Know

    Sponsored by: Cisco Umbrella

    The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.

  • How the Hybrid Cloud Changes the Game for Security

    Sponsored by: TrendMicro

    Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.

  • The State of Endpoint Security: Approaches, Opportunities and Conclusions

    Sponsored by: TrendMicro

    Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.

  • 5 Reasons to Upgrade Your Endpoint Security

    Sponsored by: Symantec

    Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.

  • Conquer malware: Cloud-based protection, multi-lane Defense, and more

    Sponsored by: Symantec

    Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.

  • Next Generation Endpoint Security: Hype or Hope?

    Sponsored by: Symantec

    Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.

  • Cloud Computing Top Threats

    Sponsored by: HPE and IntelĀ® Corporate

    This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.

  • How to Prepare for a Cloud DDoS Attack on an Enterprise

    Sponsored by: F5 Networks

    Learn the truth behind cloud DDoS attacks and how an enterprise that uses cloud services could protect itself against such a threat.

  • A Closer Look at Cloud Migration Security Risks

    Sponsored by: F5 Networks

    Explore the security challenges when moving workloads and data into the cloud, and how to mitigate the risks they entail.

  • SSL: Get the Best for You and Mitigate Vulnerabilities

    Sponsored by: A10 Networks

    Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.

  • Fabric vs. Platform Approach to Enterprise Security

    Sponsored by: Fortinet, Inc.

    Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.

  • The CISO as a Transformational Role in Risk Management

    Sponsored by: SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

    Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.

  • The Current State of Ransomware

    Sponsored by: Dell SecureWorks

    Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.