ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • CW ANZ: Trend Watch – Security

    Sponsored by: ComputerWeekly.com

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • How a Managed Service Provider Adapted to Growing Client Cybersecurity Needs

    Sponsored by: SkOUT

    To learn how LMS found a reliable partner with which they could strategically offer managed security services and ease the concerns of their clients, read the following case study.

  • How to Prevent Data Breaches

    Sponsored by: SkOUT

    How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.

  • What is Phishing?

    Sponsored by: SkOUT

    Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.

  • Anybody Home? Vulnerability Scans vs. Penetration Tests

    Sponsored by: SkOUT

    This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.

  • The Impact of Cyber-Based Financial Fraud

    Sponsored by: SkOUT

    Discover how to defend your business against cyber-based fraud by downloading the following paper, which reviews the 4 most common forms of cyber-based financial fraud, investigates the extent of their impact, and provides several defense strategies.

  • Proofpoint Security and Compliance for Microsoft Office 365

    Sponsored by: Proofpoint

    Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.

  • Cutting Bait: How to Identify, Avoid, and Protect Against Phishing

    Sponsored by: SkOUT

    How can you reduce your attack surface and prevent phishing threats? Read the following white paper, which explains how to identify, avoid, and protect against phishing and other cyber-attacks and provides 4 steps to improve online security.

  • 2019 Cyberthreat Defense Report

    Sponsored by: Gigamon

    In this 2019 Cyberthreat Defense Report, learn about the latest trends for the frequency & impact of cyberattacks, the adequacy of organizational security postures, the greatest barriers to establishing strong defenses, and more.

  • Proactive Security: Software vulnerability management and beyond

    Sponsored by: ComputerWeekly.com

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

  • Open Source Network Security Tools for Beginners

    Sponsored by: AT&T Cybersecurity

    In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • Infographic: 2019 Europe IT Priorities - Security

    Sponsored by: ComputerWeekly.com

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • How long does it take to get owned?

    Sponsored by: ComputerWeekly.com

    A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.

  • Verizon Risk Report

    Sponsored by: Verizon

    Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • The Transparent Managed Security Handbook

    Sponsored by: Expel

    Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.

  • Where to Invest Next to Mature Cybersecurity

    Sponsored by: CrowdStrike

    To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.

  • 2018-2019 Global Application & Network Security Report

    Sponsored by: Radware

    This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.

  • Network Security that's Built Right In

    Sponsored by: 128 Technology

    Learn about a zero trust security model that's designed to help businesses mitigate the risk of cyberattacks by enabling granular network segmentation, policy-based inter-router traffic encryption, fully distributed firewall protection, and more.

  • How to Reduce Security Risks through Better DNS Visibility & Analysis

    Sponsored by: Corelight

    In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.

  • Top 10 IT security stories of 2018

    Sponsored by: ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security

    Sponsored by: Auth0

    Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.