ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • 2020 Application Security Observability Report

    Sponsored by: Contrast Security

    Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.

  • Incident Response Tools: How, When & Why to Use Them

    Sponsored by: Claranet

    Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.

  • Securing the Remote Revolution

    Sponsored by: AWS & CrowdStrike

    Protecting modern remote workforces requires security capabilities that go beyond traditional approaches. This e-book provides an overview of the emerging adversary tactics targeting remote workforces and highlights new and effective cybersecurity strategies for a fully remote world – read on to get started.

  • Enhancing Orchestration Using Threat Intelligence

    Sponsored by: ThreatQuotient

    Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.

  • How to Spot a Spear Phishing Email

    Sponsored by: Vade Secure

    The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.

  • Dunkirk Enhances Microsoft 365 Email Security with Vade Secure for Microsoft 365

    Sponsored by: Vade Secure

    The victim of targeted attacks, the city and urban community of Dunkirk sought to bolster their defenses against email-based cyberattacks. This case study provides an overview of Dunkirk’s selection criteria as well as the results of their email security project – read on to get started.

  • The Evolution of Application Fraud

    Sponsored by: F5 Networks

    Cyberattacks targeting business applications have been on the rise in recent years – an issue made exponentially more prominent as web applications grew in popularity due to COVID-19 changes. This resource provides an overview of the evolution of application fraud – read on to get started.

  • Credential Stuffing 2020: Attack Tools and Trends

    Sponsored by: F5 Networks

    Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.

  • The key implementation considerations for successful customer identity management

    Sponsored by: Okta

    In theory, effective identity and access management (IAM) is about knowing who needs access to what data, when. However, in practice, this can be more challenging than it sounds – especially when considering internal changes and new business partners. Watch this video to discover how to implement effective IAM.

  • Improving Online Customer Experience with Identity Management

    Sponsored by: Okta

    Does the adoption of identity and access management (IAM) affect organizations and users differently? In this video, join 2 distinguished security experts as they overview the affect that IAM can – and will – have on users across digital interactions.

  • 5 Steps to Making Better Security Decisions

    Sponsored by: ThreatQuotient

    The goal of any cybersecurity program is to make better decisions faster. However, IT and security teams are often overwhelmed with the number of alerts requiring their attention. In this report, discover a 5-step process for making better security decisions and achieving a more effective response.

  • Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework

    Sponsored by: ThreatQuotient

    For the past 5 years, the MITRE ATT&CK project has grown into a cybersecurity staple – organizations and their security teams are adopting ATT&CK frameworks with blinding speed (and for good reason). Read this SANS paper to learn more about MITRE ATT&CK and discover why its popularity has skyrocketed.

  • KVC Health Systems Eliminates Email Security Incidents with Vade Secure

    Sponsored by: Vade Secure

    In this case study, discover how KVC was able to address the growing concerns around phishing-related attacks and explore how their partnership with Vade Secure enabled them to protect the sensitive healthcare data of their staff and patients.

  • Learn How to Detect a Phishing Email

    Sponsored by: Vade Secure

    We’ve all come across a poor phishing attempt that was immediately obvious, but cybercriminals are crafty – some phishing emails are nearly indistinguishable from an authentic email. So, where should you look to spot a phishing attack? The following resource provides 7 key areas to look at – check it out.

  • IDC Technology Spotlight

    Sponsored by: GoSecure

    In order to address the increasing frequency (and efficacy) of malware attacks, organizations have begun embracing managed detection and response (MDR) tools. This report provides an overview of MDR required capabilities, emerging trends and a closer look at the key features and capabilities of the GoSecure MDR Platform.

  • The New Business Imperative

    Sponsored by: F5 Networks

    In a business environment where customer behavior is changing, digital transformation is accelerating, the threat of fraud is proliferating and challengers are gaining ground, organizations must change their approach to succeed. Read on to learn more about balancing user functionality and cost-effectiveness.

  • The Importance of Identity in Securing Your Business

    Sponsored by: Okta

    Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.

  • Privileged Access Management to Prevent a Ransomware Attack

    Sponsored by: Hitachi Vantara

    The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.

  • 2020 SANS Cyber Threat Intelligence (CTI) Survey

    Sponsored by: ThreatQuotient

    In order to understand the risks that threaten their sensitive data, organizations are embracing cyber threat intelligence (CTI) programs. But how effective are current CTI programs? This research report provides a comprehensive look at the results of the 2020 SANS Cyber Threat Intelligence (CTI) Survey – read on to get started.

  • Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient

    Sponsored by: ThreatQuotient

    How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.

  • Cybersecurity Perceptions vs Reality

    Sponsored by: GoSecure

    This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.

  • The Ultimate Balancing Act: Enabling Emerging Technologies. Ensuring Security

    Sponsored by: Frontier Communications

    In order to defend against today’s fast-evolving threats, cybersecurity experts are recommending a multi-layered approach to network security that doesn’t prevent innovation. Read on to learn more about achieving this balancing act.

  • Qorus Software Uses Hyperproof to Gain Control Over Its Compliance Program

    Sponsored by: Hyperproof

    In this case study, follow Qorus, a sales enablement and proposal management provider, as they partner with Hyperproof to address security and compliance issues and achieve flexibility that scales as the organization grows.

  • The State of Ransomware 2020

    Sponsored by: Sophos

    Ransomware regularly dominates headlines as one of the most notorious threats facing organizations – but do the successful attacks tell the full story? In this research report, discover what happens when ransomware hits, the impacts of paying the ransom, the emergence of cybersecurity insurance, and more.

  • Trend Micro Vulnerability Protection Overview

    Sponsored by: Trend Micro

    This document outlines the process behind IDS/IPS rule creation and answers common questions about vulnerability coverage and security controls across Trend Micro’s various offerings. Read on to learn more about rule creation, quality assurance testing, hybrid cloud workload security, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.