ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • Open Source Network Security Tools for Beginners

    Sponsored by: AT&T Cybersecurity

    In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • Infographic: 2019 Europe IT Priorities - Security

    Sponsored by: ComputerWeekly.com

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • How long does it take to get owned?

    Sponsored by: ComputerWeekly.com

    A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.

  • Break the Link Between Users and Cyber Threats

    Sponsored by: Avast Business

    Because SMBs rarely have the resources to build intricate anti-malware solutions, your organization is uniquely positioned to step in and offer those necessary security layers. This white paper highlights a secure web gateway (SWG) that can help you do so. Read on for 5 main benefits and how it delivers added value for service providers.

  • Verizon Risk Report

    Sponsored by: Verizon

    Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • Next-Generation Device Security is Essential for Healthcare Providers

    Sponsored by: Lenovo and Intel

    This custom article takes a look at recent cyberattacks: breaking down where they originate, who they target, and how they operate. Find out how you can bolster your security posture by strengthening your device protection and authentication tools.

  • The Transparent Managed Security Handbook

    Sponsored by: Expel

    Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.

  • Where to Invest Next to Mature Cybersecurity

    Sponsored by: CrowdStrike

    To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.

  • 2018-2019 Global Application & Network Security Report

    Sponsored by: Radware

    This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.

  • Network Security that's Built Right In

    Sponsored by: 128 Technology

    Learn about a zero trust security model that's designed to help businesses mitigate the risk of cyberattacks by enabling granular network segmentation, policy-based inter-router traffic encryption, fully distributed firewall protection, and more.

  • How to Reduce Security Risks through Better DNS Visibility & Analysis

    Sponsored by: Corelight

    In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.

  • Top 10 IT security stories of 2018

    Sponsored by: ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security

    Sponsored by: Auth0

    Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.

  • Closing the Cybersecurity Gap

    Sponsored by: Splunk Services UK Ltd

    Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.

  • Securing your Workforce across Cloud and Mobile

    Sponsored by: Forcepoint

    In this e-book, get tips on how to evaluate your CASB and overcome the leading cybersecurity challenges in cloud and mobile-first environments.

  • Forcepoint Cloud Access Security Broker (CASB) Assessment

    Sponsored by: Forcepoint

    This ESG report examines the Forcepoint Cloud Access Security Broker (CASB) to assess its ability to secure the use of any cloud apps across an organization's users and endpoints. Explore ESG's findings and discover how Forcepoint's CASB performs in terms of visibility, risk management, and protection.

  • The Critical Role Data Access Plays in Support of GDPR

    Sponsored by: Gigamon

    Visibility into network data, wherever it resides, is foundational to maintaining GDPR compliance. Download this white paper for specific examples of where and how this applies to various articles within the regulation.

  • Combatting Botnet Traffic with Behavioral Analysis

    Sponsored by: ThreatX

    Find out how to detect and block a number of different distributed attacks with a robust security approach that's designed to grant you visibility into malicious traffic.

  • Tightly Coupling Applications and Security for Infinite Scale

    Sponsored by: ThreatX

    Find out how to modernize security so it can keep up with the demands of microservices and container-based app development.

  • Latest Cyber Security Strategies in ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.

  • Help for CISOs Overwhelmed by Cybersecurity Threats

    Sponsored by: MASERGY

    Find out how to build your security strategy on a foundation of executive and senior IT-level collaboration, supported by managed detection and response services.

  • Build Identity Verification Processes with the Power of AI

    Sponsored by: Jumio

    This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.