Security Standards Research
-
5 IAM Trends Shaping the Future of Security
Sponsored by: Beta SystemsModern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
-
Incident Response Tools: How, When & Why to Use Them
Sponsored by: ClaranetIncident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
-
Kaspersky Lab’s COVID-19 Relief Initiatives
Sponsored by: KasperskyAmid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
-
Proactive Security: Software vulnerability management and beyond
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
-
Infographic: 5 ways to achieve a risk-based security strategy
Sponsored by: TechTarget ComputerWeekly.comIn this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
-
Top 10 IT security stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThe discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
Cybersecurity: The Latest Battleground for MSPs
Sponsored by: SkOUTOur experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
-
Build Identity Verification Processes with the Power of AI
Sponsored by: JumioThis expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
-
Adapt Security for Hybrid Cloud Environments
Sponsored by: CitrixIn this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
-
Six Criteria for Buying Data Loss Prevention Products
Sponsored by: InteliSecureDiscover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
-
Introduction to Data Loss Prevention Tools
Sponsored by: InteliSecureIn this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
-
How the Basics of Network Security Have Evolved
Sponsored by: Fortinet, Inc.In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
-
The Security Risks of IoT
Sponsored by: Fortinet, Inc.In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose.
-
SSL: Get the Best for You and Mitigate Vulnerabilities
Sponsored by: A10 NetworksInside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
-
Your IIoT Security Plan: Risks in Manufacturing
Sponsored by: Bayshore NetworksIn this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
-
How to Resolve a Web Application Security Vulnerability
Sponsored by: Veracode, Inc.Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
-
Application Development Security Requires Forethought
Sponsored by: Veracode, Inc.Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
-
Resolve Web Security Issues with Industry Experts' Advice
Sponsored by: Veracode, Inc.Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
-
How to Effectively Manage the Cloud Logs of Security Events
Sponsored by: SplunkDiscover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
-
Comparing Top Shelf Email Encryption Software Products
Sponsored by: Hewlett Packard EnterpriseAccess this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
-
Incident Response Tools Can Help Automate Your Security
Sponsored by: ModoModoA major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
-
Top Mobile Security Threats: Insight Into Threats and Attackers
Sponsored by: LookoutDiscover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
-
Incident Response Tools Can Help Automate Your Security
Sponsored by: Cisco Umbrella and Dimension DataIn this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
-
7 Elements of Cybersecurity Readiness
Sponsored by: Cisco Umbrella and Dimension DataDiscover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
-
Building an Application Security Program: Why Education is Key
Sponsored by: tCellGain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.