ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • How Does Security Innovation Power Digital Transformation?

    Sponsored by: ZeroNorth

    Digital transformation defined by its seeming-endless search for technological innovation. Unfortunately, security can sometimes be an afterthought for companies looking to stay ahead of the competition. In this white paper, discover how security innovation can augment digital transformation.

  • The New Norm: Trend Micro Security Predictions for 2020

    Sponsored by: Trend Micro

    Industry experts at Trend Micro recently conducted research into past cybersecurity trends to develop their predictions for ever-evolving landscape of cybersecurity threats and defense methods in 2020 and beyond. Continue to read the full report.

  • IDC Worldwide Cloud Security Market Shares, 2018: Protecting Workloads in Hybrid and Multicloud

    Sponsored by: Trend Micro

    SDC workload security spans threat protection, vulnerability management, analytics, and data integrity to protect what runs on top of the SDC infrastructure. This research report offers advice for technology suppliers and highlights the global market share. Read on to uncover the results.

  • Webinar: You Need Live Patching to Achieve SOC2 Compliance

    Sponsored by: CloudLinux

    In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.

  • Spear-phishing Analysis with ThreatQ Investigations

    Sponsored by: ThreatQuotient

    Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. This webinar provides an analysis of how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.

  • Security Controls for Effective Micro-Segmentation

    Sponsored by: ShieldX

    With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.

  • ESG XDR Paper: Beyond EDR

    Sponsored by: Trend Micro

    76% of companies feel that threat detection and response is more difficult today than it was 2 years ago. SIEM approaches are becoming too costly, and EDR tools aren’t a standalone option. So, what options, if any, do organizations have? Read on to learn more.

  • Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way

    Sponsored by: Malwarebytes

    In this short story, following the journey of Olivia and Luciana as they face the cybersecurity threats associated with remote workers, VPNs and cloud platforms to establish the necessary technologies and employee enablement to overcome these challenges and reshape their security strategy.

  • How to Build a Winning Cybersecurity Team

    Sponsored by: Global Knowledge

    Just like a sports team, cybersecurity teams need to be carefully built and managed in order to reach peak performance. Effective cybersecurity teams also require adequate processes and technologies to support their efforts. So, what should you consider when building a winning cybersecurity team? Read on to find out.

  • Making MITRE ATT&CK Actionable

    Sponsored by: ThreatQuotient

    In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.

  • Security Governance: Building a Framework and Establishing Trust

    Sponsored by: RSA Conference

    Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged presentation, see how Kuwait’s oil and gas companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.

  • Malwarebytes Endpoint Protection & Response (EDR)

    Sponsored by: Malwarebytes

    According to a study, close to 60% of endpoints harbor hidden threats. These threats can disrupt productivity and cause financial and legal damage. In this solution brief, explore Malwarebytes’ Endpoint Protection and Response (EDR) platform and uncover its key features and benefits.

  • Emerging Technology Analysis: SOAR Solutions

    Sponsored by: ThreatQuotient

    Although SOAR and SIEM share similar security capabilities, they are distinct markets unlikely to consolidate. However, technology leaders at SOAR providers need to understand this distinction in order to build upon existing SIEM services. This deep dive from Gartner focuses on SOAR and offers recommendations for SOAR providers.

  • A Modern Approach to Endpoint Remediation

    Sponsored by: Malwarebytes

    According to incident response teams, 68% of cases they investigate are caused by malware. The costs and manpower required to remediate these issues is rising, and organizations need a modern approach to protecting their endpoints. In this solution brief, dive deeper into Malwarebytes’ modern approach to endpoint protection and response.

  • Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky

    Sponsored by: Tehama

    Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.

  • What is Tehama?

    Sponsored by: Tehama

    Today’s organizations need speed, security and access in order to stay competitive. In one SaaS platform, Tehama consolidates all capabilities and tools necessary to ensure secure access, continuous auditing and compliance enforcement. Continue to learn more about Tehama.

  • Buyer’s Guide Digital Identity Verification

    Sponsored by: Mitek Systems, Inc.

    Much of today’s customer interaction is done via digital interactions. As this trend continues to grow, organizations need to ensure that they balance customer experience with security. This buyer’s guide provides an overview of current identity verification tools as well as an evaluation workbook to steer you towards an informed decision.

  • ThreatQ for Critical Infrastructure

    Sponsored by: ThreatQuotient

    Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.

  • Buyer’s Guide to Threat Intelligence Platforms

    Sponsored by: ThreatQuotient

    As organizations begin to build their threat intelligence operations, they must consider how they will organize their data. Threat intelligence platforms (TIPs) give IT teams the visibility required to make the most of existing resources. Read this white paper to learn more about TIP, and how to go about making an informed buying decision.

  • Protect your users and devices with Cisco Umbrella and Cisco AMP for Endpoints

    Sponsored by: Cisco Umbrella

    An estimated 70% of breaches start on endpoints – laptops, workstations, servers and mobile devices. Why are attackers targeting endpoints, and how can an organization better defend itself? Read this solution brief to discover how combining Cisco Umbrella and Cisco AMP can allow you establish effective endpoint protection.

  • How to Safeguard Against Cross-Site Scripting (XSS) Attacks

    Sponsored by: Tala Security

    Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.

  • Cisco Umbrella & Duo Security: Protect users and secure access to applications

    Sponsored by: Cisco Umbrella

    As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.

  • The Right Way to Combat Customer Journey Hijacking

    Sponsored by: Tala Security

    Most IT security teams focus on protecting user data, with little focus on user experience. By implementing a strategy that provides front-end and back-end protection, you can safeguard the interactions customers have with you, prevent the financial and reputational impacts of customer journey hijacking. Read on to get started.

  • Magic Quadrant for Managed Security Services, Worldwide

    Sponsored by: Alert Logic

    Managed security services (MSSs) enable organizations to outsource certain tasks to ensure security events are being monitored 24/7. In this Gartner Magic Quadrant report, go in-depth into the key MSS providers to identify those best aligned to the needs of your organization.

  • Machine Learning Applications for Banking Fraud Detection

    Sponsored by: Dataiku

    AI-based systems can augment regulatory alert systems and improve analysts’ workflow by reducing noise without discarding results. Access this paper to view the 3 types of anomalies to look out for, understand examples of how banks use fraud and anomaly detection, and learn how to build a basic, machine learning-based fraud detection system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.