ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • PCI Council issues mobile application rules for software developers

    Sponsored by: TechTarget Security

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets

    Sponsored by: Iron Mountain

    Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.

  • How to Solve Security Problems Within Your Organization

    Sponsored by: Wisegate

    Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.

  • For Secure Access, Passwords Alone Do Not Work

    Sponsored by: Verizon

    This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.

  • Safeguarding Business in a Time of Expanding and Evolving Cyber Threats

    Sponsored by: Verizon

    This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.

  • MDM for a Secure Mobile Workforce

    Sponsored by: BlackBerry

    This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.

  • How Secure is Your Platform With the Evolving Threat Landscape?

    Sponsored by: IBM

    This exclusive paper analyzes the business differentiators among the leading security vendors and examines how safe they can actually keep your data.

  • Clearswift Government Communications 2.0

    Sponsored by: Clearswift

    In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.

  • IBM X-Force 2013 Mid-Year Trend and Risk Report

    Sponsored by: IBM

    In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).

  • Security University: Cloud Security

    Sponsored by: TechTarget Security

    Learn strategies for how to positively influence the security of cloud computing projects in your organization.

  • Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management

    Sponsored by: Lumension

    In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.

  • Salvation Army Protects the Integrity of Data and Global Brand

    Sponsored by: Lumension

    In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • Enterprise Security Checklist

    Sponsored by: Code42

    This 6-item checklist provides key recommendations to help boost security against today's cybercrime.

  • Computer Weekly – 2 April 2013: The benefits of context-aware security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.

  • SSL Certificate Management: Common Mistakes and How to Avoid Them

    Sponsored by: Thawte Inc.

    Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.

  • Security visualisation

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities.

  • Tripwire VIA System State Intelligence executive brief

    Sponsored by: Tripwire, Inc.

    What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.

  • Security-In-Depth Using Integrated Risk-Conscious Controls

    Sponsored by: Tripwire, Inc.

    This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.

  • Webroot  Endpoint Security eBook

    Sponsored by: OpenText Security Solutions

    This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.

  • Mobile Security Solutions: Securing & Leveraging Mobile Devices

    Sponsored by: Entrust, Inc.

    This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.

  • Closing the Back Door on Network Application Vulnerabilities

    Sponsored by: Sophos

    This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.

  • Compliance Driven Security

    Sponsored by: DellEMC and Intel®

    With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.

  • Compliance strategies for greater cyber security policies

    Sponsored by: HP Enterprise Security

    Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.

  • May Technical Guide on PCI DSS Guidance

    Sponsored by: TechTarget Security

    This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.