ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work

    Sponsored by: Okta

    While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.

  • Hot Topic Live Okta Guy Mason

    Sponsored by: Okta

    In this episode of Hot Topics Live, join the CIO of Bourne Leisure, a major player in the UK holiday and hospitality industry, as they discuss how the organization dealt with the pandemic and its ensuing lockdown.

  • Shor's Algorithm

    Sponsored by: Thales

    While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.

  • BlackBerry Secures 96% of the Enterprise IoT Threat Landscape

    Sponsored by: BlackBerry

    Frost & Sullivan has published an assessment of the cyberthreat landscape and the proportion that BlackBerry’s suite of technologies can protect against. Read on to uncover the results.

  • You've Got BEC!

    Sponsored by: Proofpoint

    BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.

  • Hunt for Data Protection Ends with Encryptionizer®

    Sponsored by: NetLib Security

    In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.

  • Data Catalogs for Privacy

    Sponsored by: BigID

    The growing need for data privacy is a driving force for data catalogs: organizations need to be able to layer in context from personal, sensitive, and situational data to get value out of data management. Download this white paper to learn more about evolving traditional data catalogs to reflect the needs of the privacy age.

  • Securing the New Normal: A Virtual Happy Hour on Moving Forward

    Sponsored by: RSA Conference

    In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.

  • Cyberattacks are a Reality. Are You Ready for Them?

    Sponsored by: Verizon

    Cyberattacks happen and they happen often, threatening critical data. Knowing when incidents might occur - and whether you're prepared to defend against them - can make all the difference. Find out how effective your security plan will be if you suffer an attack.

  • Wavefront Secures DevOps Environments at Scale with Lacework

    Sponsored by: Lacework

    Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.

  • Carson Living Secures Rapidly Growing Cloud Environment

    Sponsored by: Lacework

    Due to the rapid growth in adoption (400% in the past year) of their AWS-hosted application, Carson Living was facing issues related to ensuring cloud compliance and maintaining security configurations. Download this white paper to see what led to their partnership with Lacework, as well as the results.

  • Driving Resiliency and Security in the Financial Services Industry

    Sponsored by: BMC

    Resiliency is critical to the long-term success of the financial services industry. This is due to the amount of sensitive personal and financial data they manage that have attracted increasingly sophisticated cyberattack methods. Read on to discover best practices for ensuring security and resiliency of t financial services organizations.

  • Five Key Elements of Continuous IT Compliance

    Sponsored by: BMC

    As compliance regulations become more stringent, security and compliance teams are under additional pressure to ensure security, reduce risk and avoid conflicts. Download this white paper to learn more about a modern, intelligent approach to security – including 5 critical elements necessary for continuous IT compliance.

  • An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context

    Sponsored by: Delve

    To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.

  • The CISO Speaks: Insights From the Frontlines

    Sponsored by: RSA Conference

    In today’s increasingly complex cybersecurity landscape, CISOs play an essential role both within the C-suite and across multiple critical areas of an organization. With more cybersecurity professionals looking to CISOs for insights on the latest challenges and trends, RSA Conference blogger Tony Kontzer conducts Q&As with today’s leaders.

  • Leveraging AI to Modernize Vulnerability Management and Remediation

    Sponsored by: Delve

    Advances in AI provide organizations with the ability to automate workloads and offer intelligent decision-making capabilities, easing the burden on IT and security teams and allowing them to focus on strategic imperatives. Download this white paper to learn more about embracing AI to modernize vulnerability management and remediation.

  • From 30% to 100% Remote: How to Lead the Rapid Shift to a Remote Workforce

    Sponsored by: Okta

    Connecting and communicating is critical for maintaining a semblance of normality, especially during times of crisis. Achieving this in the era of COVID-19, which saw the remote workforce jump from 30% to 100%, has been particularly challenging. Watch this webinar to see how IT and workplace technology experts at Okta handled this transition.

  • Remote Working: How to Make the Laptop Lifestyle Flow Sweetly (and Securely) for Your Business

    Sponsored by: Kaspersky Lab

    58% of staff are motivated by the flexibility offered by working from home. Take a glimpse at this white paper released before the outbreak of COVID-19 outlining WFH benefits, trends and challenges.

  • Access Management is Essential for Cloud Transformation

    Sponsored by: Thales

    Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.

  • 10-Step Executive Action Plan for Collective Defense

    Sponsored by: IronNet

    A collective approach may be beneficial to organizations searching for security advantages.Indeed, a heightened security posture often begins and ends with collaboration. In this e-book, read more about how a combination of organizational preparedness and advanced technology can aid in defending against threats.

  • Cloud Migration Challenges

    Sponsored by: BigID

    Cloud migrations are nearing the point of necessity – even for highly regulated and risk-averse organizations. So, how can these organizations minimize risk, ensure data privacy and avoid costly disruptions? Read on to learn more about the challenges of cloud migration and how BigID is helping organizations overcome these obstacles.

  • How to Get the Most Value out of Your Penetration Test

    Sponsored by: RSA Conference

    At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.

  • Royal Holloway: Man proposes, fraud disposes

    Sponsored by: ComputerWeekly.com

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.

  • SMB Cybersecurity: The Need for Better Protection

    Sponsored by: Kaspersky Lab

    Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.