ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • Top 10 IT security stories of 2018

    Sponsored by: ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • Closing the Cybersecurity Gap

    Sponsored by: Splunk

    Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.

  • Solving the Financial Services Security Talent Shortage with Managed Detection

    Sponsored by: Arctic Wolf

    This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.

  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service

    Sponsored by: Arctic Wolf

    This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).

  • SOC-as-a-Service for Financial Institutions

    Sponsored by: Arctic Wolf

    Find out how mid-sized financial organizations can overcome the leading compliance and security challenges with managed detection and response services.

  • No Business Is Too Small a Target for Hackers

    Sponsored by: Arctic Wolf

    Find out how SMBs, despite the fact that they lack the resources and skilled experts that many of their larger contemporaries have, can step up their defense against hackers with measures like security operations center as a service (SOCaaS).

  • Endpoint Detection & Response Is Not Enough

    Sponsored by: Arctic Wolf

    Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.

  • Cybersecurity Essentials Every Law Firm Needs

    Sponsored by: Arctic Wolf

    Organizations like law firms possess vast quantities of highly sensitive information that puts them at the top of hackers' hit lists. Learn about 5 essential security capabilities for protecting company and client data that every firm must have.

  • SOC-as-a-Service for Cloud Infrastructures and SaaS Applications

    Sponsored by: Arctic Wolf

    Find out how to overcome some of the top security challenges facing hybrid cloud architectures – from data exfiltration to insider threats – with a security operations center as a service (SOCaaS).

  • Everything Starts with DNS: Making the Internet a Safer Place

    Sponsored by: Farsight Security

    During an investigation into potential cybercriminal activity, there's usually a domain or IP address that serves as your starting point. Find out how to use the world's largest real-time and historical DNS intelligence database to bring new levels of insight to your investigation.

  • How ThreatConnect Leverages DNSDB to Track Down Grizzly Steppe

    Sponsored by: Farsight Security

    Find out how ThreatConnect used a passive DNS database intelligence approach to extend Grizzly Steppe data from the Joint Analysis Report and discover new indicators that expose cyberespionage activity.

  • Latest Cyber Security Strategies in ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.

  • Simplify Compliance for FFIEC-NCUA with a Security Operations Center

    Sponsored by: Arctic Wolf

    Find out how financial organizations can simplify FFIEC/NCUA compliance by leveraging a security operations center as a service (SOCaaS).

  • 3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)

    Sponsored by: OneLogin

    Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.

  • How a Security Expert Defends Your Network's Blind Spots

    Sponsored by: Arctic Wolf

    Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).

  • Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical

    Sponsored by: Arctic Wolf

    In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.

  • How to Protect Against the Top 5 Cyberattacks

    Sponsored by: Arctic Wolf

    Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.

  • Application security: More important than ever

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • Spear Phishing: The #1 Threat

    Sponsored by: Farsight Security

    Find out how you can combat spear phishing with a Newly Observed Domains (NOD) platform that integrates with your company's DNS to help you identify all new domains, assess potential threats, and prevent attacks from infiltrating your systems.

  • Security Operations Center: Build on the Native Security Features of AWS and Office 365

    Sponsored by: Arctic Wolf

    This webcast explores the field of top cybersecurity threats and covers best practices for securing cloud deployments. Find out what cloud services providers like AWS and apps like Office 365 are already doing to secure information as well as how you can build on that foundation to further bolster your defenses.

  • Data protection: A business imperative

    Sponsored by: ComputerWeekly.com

    In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.

  • CW ASEAN: Time to dial up defences

    Sponsored by: ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

  • Build Identity Verification Processes with the Power of AI

    Sponsored by: Jumio

    This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.

  • Adapt Security for Hybrid Cloud Environments

    Sponsored by: Citrix

    In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.