ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • Threat Intelligence Report: RSA Conference Edition 2020

    Sponsored by: Mimecast

    The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.

  • MITRE ATT&CK: Security Evaluation Overview

    Sponsored by: BlackBerry

    MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.

  • 9 Steps to Success with Data Protection

    Sponsored by: Forcepoint

    Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.

  • All Clouds are not Equal

    Sponsored by: Forcepoint

    Nowadays, organizations turn to the cloud for nearly every business capability, security included. However, despite the clear advantages of cloud-based security, certain misconceptions exist. Read this e-book for a breakdown of 5 common misconceptions and discover what to look for in a cloud-based security solution.

  • MITRE ATT&CK: The Power of Prevention

    Sponsored by: BlackBerry

    In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.

  • Panelist Discussion with Q&A

    Sponsored by: BlackBerry

    In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.

  • How to Help Prevent Increasingly Rampant Brand Exploitation

    Sponsored by: Mimecast

    A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.

  • The Business Case for Cysiv SOC-as-a-Service

    Sponsored by: Cysiv

    Like most modern technology purchases, organizations interested in investing in a security operations center (SOC) can decide between an on-premise SOC or SOC-as-a-Service, depending on their organization’s specific needs. Download this white paper to discover the benefits of the SOC-as-a-Service model by looking at Cysiv’s SOC-aaS offering.

  • Faster Threat Detection and Response with Data Science and Next-gen SIEM

    Sponsored by: Cysiv

    Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.

  • 5 steps to secure the enterprise and be fit for a flexible future

    Sponsored by: Avanade

    From drastic shifts in remote capabilities to exacerbated security risks, COVID-19 has completely changed the cybersecurity landscape. The most effective way to approach securing your enterprise in the ‘new normal’ is to rethink cybersecurity strategies and challenges. Download this Avanade strategy guide to help guide your restructuring.

  • 3 Indicators to Monitor for Business Email Compromise (BEC)

    Sponsored by: CI Security

    Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.

  • Financial Services Companies Own Your Share of Responsibility in Cloud Security

    Sponsored by: Ionic Security

    How can financial services companies embrace the benefits of the cloud while minimizing the impact of its risks? This guide offers insights that define the scope of your responsibilities in cloud security and best practices for wherever you are in your journey to the cloud.

  • 5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud

    Sponsored by: Ionic Security

    In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.

  • How to prepare for and survive a ransomware attack

    Sponsored by: Bytes Technology Group

    In this white paper, unlock expertise regarding preparing for and surviving ransomware attacks by looking at detailed processes and procedures for detecting, isolating, and recovering data infected by ransomware – including proven methods for securing and protecting data.

  • 12 Things You Should Do to Stop Ransomware

    Sponsored by: ThreatLocker

    To help organizations address some of the commonly overlooked practices (or lack thereof) that can better detect and mitigate ransomware attacks, ThreatLocker compiled a list of practices that highlights 12 things your organization should be doing to stop ransomware attacks. Download now to unlock these 12 necessary practices.

  • Transforming the SOC

    Sponsored by: Mimecast

    Each year, organizations explore new technological territories and hackers grow more complex. This is made more difficult by an ever-expanding cybersecurity skills gap. This resource captures the expertise of independent industry leaders dedicated to addressing this imbalance by helping organizations rethink security operations – download now.

  • Achieving HIPAA Compliance with Alcide Kubernetes Security

    Sponsored by: Alcide

    The need better security patient PHI in the US led to the inception of HIPAA. The following white paper outlines the key objectives of HIPAA, the challenges of achieving compliance in cloud-native environments, and how to ensure intersectional PHI security between HIPAA and the NIST Cybersecurity Framework.

  • The Impact of Malicious Extensions for Chrome and Other Browsers

    Sponsored by: ThreatLocker

    By relying on a web browser provider to improve privacy and security protections, organizations put themselves at risk of a zero-day attack. Read this blog post for specific examples of the impacts of malicious Google Chrome extensions and what your organization can do to better prevent them.

  • 100 Days of Coronavirus (COVID-19)

    Sponsored by: Mimecast

    To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.

  • Aligning Cyber Risk Management with Business Performance

    Sponsored by: Coalfire

    Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.

  • 2020 Data Breach Investigations Report

    Sponsored by: Verizon

    Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Read on to unlock the complete 119-page report overviewing this year’s findings.

  • Defense in Depth: Closing the Gaps in Microsoft 365 Security

    Sponsored by: Mimecast

    While email platforms like Microsoft 365 offer native security features, their ability to address today’s email-based cyberattacks is often called into question. So, how prepared is your organization to stop these threats? Download this white paper to discover security challenges and recommendations for organizations using Microsoft 365.

  • Reece Group Protects Endpoints and Automates Threat Management

    Sponsored by: BlackBerry

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

  • Vormetric Transparent Encryption for the SAP HANA® Data Management Suite

    Sponsored by: Thales

    While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.

  • Avoiding Data Leaks with Scalable Encryption and Access Controls

    Sponsored by: Thales

    Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.