ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Best Practices for Successful Transformation Journey with Automation

    Sponsored by: Red Hat

    In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.

  • The Evolution of Automation: Unite People and Opportunity for Growth

    Sponsored by: Red Hat

    To ensure the productivity and security needs of today’s organizations are being met, IT leaders are embracing the benefits of automation for unifying their people and processes. Watch this webinar for an in-depth look at the Red Hat Ansible automation platform – its key features, capabilities and success stories.

  • Modernizing SOCs with Advanced Threat Intelligence

    Sponsored by: Bitdefender

    This webinar provides a comprehensive look at the challenges, threats, and trends as they relate to today’s SOCs, and offers insight into embracing tactical, operational and strategic threat intelligence. Join Jarret Raim and Daniel Clayton, IT security leaders at Bitdefender, as they discuss the need to modernize your SOC.

  • Dynamic Data Protection

    Sponsored by: Forcepoint

    The following solution brief provides an inside look into Forcepoint Dynamic Data Protection, which combines behavior analytics with data protection capabilities to enable your organization to prioritize high-risk activity and automate policies – ensuring security without sacrificing productivity. Read on for an overview of the key features.

  • Lookout Discovery: Chinese Surveillanceware

    Sponsored by: Lookout

    The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.

  • Threat Intelligence Driven Detect and Response Operations

    Sponsored by: Bitdefender

    Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.

  • Securing Your Data Stored in OneDrive: SailPoint Demo

    Sponsored by: SailPoint Technologies

    In order to responsibly migrate to the cloud, organizations need to take deliberate steps to ensure their cloud-native data is just as secure as on-premise data. Watch this short video for a brief overview of the challenges of ensuring cloud data protection and ways to overcome them.

  • Don’t Just Educate: Create Cybersafe Behavior

    Sponsored by: Mimecast

    Building a cyber-resilient culture involves more than a cut-and-paste security training program that ticks the compliance checklist. In this Forrester study, discover how applying proven behavioral science to SA&T programs can yield organization-wide cultural change and improve security at the people-level.

  • Enterprise Data Protection Solutions, Explained

    Sponsored by: Forcepoint

    Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.

  • Protecting the Enterprise Edge - Cloud

    Sponsored by: Forcepoint

    Traditional, on-premise gateways are no longer viable for organizations undergoing digital transformations. Today’s cloud-embracing organizations requires security that can address the emerging risk areas and ensure the protection of users, regardless of physical location. Read this solution brief so learn about how Forcepoint may be able to help.

  • The Enterprise Guide to Cloud Security Essentials

    Sponsored by: Forcepoint

    Like almost any other aspect of business, cloud security is people-driven, which is why it must be people-centric in practice. Download this brochure, The Enterprise Guide to Cloud Security Essentials, to discover how to overcome key cloud concerns achieve security at the people-level.

  • The Road to Digital Transformation: Enabling OT-IT Convergence

    Sponsored by: Orange Business Services

    This IDC InfoBrief, The Road to Digital Transformation: Enabling OT-IT Convergence, provides an in-depth look at the obstacles and opportunities as they relate to embracing digital transformation through operational technology (OT) and information technology (IT) convergence. Read on to leverage IDC’s expert guidance.

  • Threat Intelligence Report: RSA Conference Edition 2020

    Sponsored by: Mimecast

    The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.

  • MITRE ATT&CK: Security Evaluation Overview

    Sponsored by: BlackBerry

    MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.

  • 9 Steps to Success with Data Protection

    Sponsored by: Forcepoint

    Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.

  • All Clouds are not Equal

    Sponsored by: Forcepoint

    Nowadays, organizations turn to the cloud for nearly every business capability, security included. However, despite the clear advantages of cloud-based security, certain misconceptions exist. Read this e-book for a breakdown of 5 common misconceptions and discover what to look for in a cloud-based security solution.

  • MITRE ATT&CK: The Power of Prevention

    Sponsored by: BlackBerry

    In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.

  • Panelist Discussion with Q&A

    Sponsored by: BlackBerry

    In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.

  • How to Help Prevent Increasingly Rampant Brand Exploitation

    Sponsored by: Mimecast

    A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.

  • The Business Case for Cysiv SOC-as-a-Service

    Sponsored by: Cysiv

    Like most modern technology purchases, organizations interested in investing in a security operations center (SOC) can decide between an on-premise SOC or SOC-as-a-Service, depending on their organization’s specific needs. Download this white paper to discover the benefits of the SOC-as-a-Service model by looking at Cysiv’s SOC-aaS offering.

  • Faster Threat Detection and Response with Data Science and Next-gen SIEM

    Sponsored by: Cysiv

    Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.

  • 5 steps to secure the enterprise and be fit for a flexible future

    Sponsored by: Avanade

    From drastic shifts in remote capabilities to exacerbated security risks, COVID-19 has completely changed the cybersecurity landscape. The most effective way to approach securing your enterprise in the ‘new normal’ is to rethink cybersecurity strategies and challenges. Download this Avanade strategy guide to help guide your restructuring.

  • 3 Indicators to Monitor for Business Email Compromise (BEC)

    Sponsored by: CI Security

    Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.

  • Financial Services Companies Own Your Share of Responsibility in Cloud Security

    Sponsored by: Ionic Security

    How can financial services companies embrace the benefits of the cloud while minimizing the impact of its risks? This guide offers insights that define the scope of your responsibilities in cloud security and best practices for wherever you are in your journey to the cloud.

  • 5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud

    Sponsored by: Ionic Security

    In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.