ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: TechTarget Security

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • The IT Security Manager's Guide to Incident Response & Shadow IT

    Sponsored by: Cisco Umbrella

    This expert guide presents 13 steps you should take to develop the best cybersecurity incident response plan, so you can be prepared for unknown threats to your network. You'll also learn about managing the potential damage that shadow IT can do to your enterprise.

  • SOC Analyst in a Box

    Sponsored by: TechTarget Security

    Discover endpoint detection and response (EDR) tools and incident response procedures that will help shorten the time between threat detection and response.

  • The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data

    Sponsored by: UnitedLex

    Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.

  • The Problem Facing Advanced Threat Defense

    Sponsored by: UnitedLex

    The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.

  • Advanced Persistent Threat Detection: Can It Find Custom Malware?

    Sponsored by: UnitedLex

    A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: UnitedLex

    While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.

  • Targeted Cyber Attacks: Infecting the Victim

    Sponsored by: UnitedLex

    This e-guide goes in-depth examining the most popular attacks used by hackers and what steps you need to take to defend yourself.

  • The Need-to-Know of Today's Cloud Security

    Sponsored by: TechTarget Cloud Computing

    In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.

  • Encryption's Risks, Benefits, and Roles in SSL Attacks

    Sponsored by: Symantec Website Security

    In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.

  • How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences

    Sponsored by: Symantec Website Security

    This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.

  • Monitoring that Cloudy Network

    Sponsored by: TechTarget Security

    Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud. In this guide, learn how to adapt and advance your security monitoring efforts.

  • Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Threat Monitoring in Tough Times

    Sponsored by: TechTarget Security

    Today's threat environment can be murky, and advanced security monitoring is essential. Access this three-part guide and learn the latest means for rooting out the fast-moving malicious actors that are targeting your enterprise's systems.

  • "Hacking as a Service," and Other Emerging Threats

    Sponsored by: TechTarget Security

    Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.

  • Endpoint Security Management: Beyond Antivirus

    Sponsored by: TechTarget Security

    Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.

  • MicroScope August: Security Update

    Sponsored by: MicroScope

    An issue looking at how the channel can overcome the skills problems and a chance to hear from a range of leading vendors on how the security market is faring

  • Can New Security Tools Keep Your Network Clean?

    Sponsored by: TechTarget Security

    Modern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Surviving in a State of DDoS Denial

    Sponsored by: TechTarget Security

    DDoS attack prevention begins with understanding the nature of the latest sophisticated attacks. In this guide, leading security pros explain the mechanics of DDoS, the nature of the newest mega-attacks, and provide concrete, actionable guidance to make your systems as strong as possible.

  • The Essential Guide for Threat Intelligence Services: What to Look For

    Sponsored by: TechTarget Security

    This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.

  • Who's in Your Wallet? Stemming Credit Card Fraud

    Sponsored by: TechTarget Security

    Access this technical guide and learn about the standards the payment card industry uses to mitigate the problem including the costs of such standards to your business. Find out the latest info on credit card fraud, industry guidance and how to optimize your system for legitimate customers.

  • Cisco 2015 Annual Security Report

    Sponsored by: Cisco Systems, Inc.

    Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.

  • Why Every CIO Should Consider Vulnerability Assessment a Necessity

    Sponsored by: IBM

    In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.