ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection

    Sponsored by: ComputerWeekly.com

    Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware

  • Making the case for cloud-based security

    Sponsored by: ComputerWeekly.com

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

  • Eileen Jennings-Brown Podcast

    Sponsored by: Okta

    Tune into “The Future of Work” with Eileen Jennings-Brown, Wellcome Trust’s Head of Technology, to learn how Jennings-Brown is preparing her team for the future of remote working.

  • What SMBs Need to Know to Survive a Ransomware Attack

    Sponsored by: RSA Conference

    Ransomware is costly and can be catastrophic for businesses—but it doesn’t have to be. This webcast focuses on the cybersecurity needs of small to medium-sized businesses. Industry leaders walk you through the steps you can take (regardless of your budget) to ensure that your business survives a ransomware attack.

  • 7 Ways AI Can Automate and Improve Vulnerability Management Operations

    Sponsored by: Delve

    Although under-utilized, AI has the potential to streamline operations through automation while reducing vulnerability risk for vulnerability management operations. Read this white paper to discover 7 ways AI can automate and enhance traditional or stagnant vulnerability management operations.

  • MSPs: The 5 Essentials from Your Endpoint Security Partner

    Sponsored by: Malwarebytes

    When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.

  • Kaspersky Lab’s COVID-19 Relief Initiatives

    Sponsored by: Kaspersky Lab

    Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.

  • How Threat Modeling & Attack Simulation Works

    Sponsored by: Coalfire

    In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.

  • Data Minimization Challenges

    Sponsored by: BigID

    As the volume of data to manage grows exponentially, the need for data minimizations in cloud migrations and other cybersecurity endeavors becomes critical. Download this solution brief and discover how BigID can help organization to implement an automated approach to reduce security, compliance and governance risks.

  • RSAC Resource Guide: U.S. Election Security 2020

    Sponsored by: RSA Conference

    Many cybersecurity experts have expressed concerns about the security of the upcoming U.S. elections. This RSAC Resource Guide: U.S. Election Security 2020 compiles expertise from industry leaders to provide readers with the insight and information they need to understand this topic.

  • MSP best practices for securing servers

    Sponsored by: Malwarebytes

    Servers are the backbone of any managed service provider (MSP) making them a major target for spyware and ransomware. Access this data sheet to learn 4 best practices for securing your servers to ensure your organizations critical information is safe from online attackers.

  • Proactive Security: Software vulnerability management and beyond

    Sponsored by: ComputerWeekly.com

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

  • Light Agent or Agentless

    Sponsored by: Kaspersky Lab

    Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.

  • The Future of Work: Okta Podcast

    Sponsored by: Okta

    Listen to the first episode of The Future of Work Series, in partnership with Okta, with Guy Mason, Bourne Leisure Group’s CIO, in conversation with Editor Peter Stojanovic as they discuss how to adjust to a remote work lifestyle.

  • How malware authors make attack detection simple yet complex

    Sponsored by: Cisco Umbrella

    Emerging malware techniques indicate that cybercriminals are favoring simple, yet complex tricks in order to successfully conduct their campaigns. Watch this video to learn more about trending threat patterns, new malware tricks and how the simplest techniques can help organizations overcome these challenges.

  • Bot Management Vendors, 2020

    Sponsored by: Akamai Technologies

    After evaluating 13 vendors on 10 criteria, The Forrester New Wave: Bot Management, Q1 2020 report names Akamai a Leader. The Akamai Intelligent Edge Platform provides unmatched visibility into the ever-changing bot landscape. Download this new report to review and select the right partner for your bot management needs.

  • Privacy Essentials for Security Professionals

    Sponsored by: BigID

    Today’s security professionals face growing pressure – both internally (cybersecurity initiatives) and externally (CCPA, GDPR & other data privacy regulations). This data sheet outlines key consideration areas to help organizations meet compliance requirements and ensure data protection across their environment.

  • Discovery-In-Depth: The Path to Data Intelligence

    Sponsored by: BigID

    Data discover is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.

  • BlackBerry AI Powered Zero Trust

    Sponsored by: BlackBerry

    Endpoint security affects all aspects of an organization, not least when workforces are remote.To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner?This webcast presents models that organizations can use.

  • Auth0’s Approach to Information Security Identity in the Real World

    Sponsored by: Auth0

    Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.

  • Hot Topic Live: Eileen Jennings-Brown

    Sponsored by: Okta

    COVID-19 has been a pivotal event in reshaping not just where we work, how we work or who we work with, but what works. In this Future of Work episode, Eileen Jennings-Brown discusses how her organization, Wellcome Trust, prepared for remote working and how her team is preparing for further disruption in the future.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • CIO Trends #11: Benelux

    Sponsored by: ComputerWeekly.com

    The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

  • How to Implement Zero Trust Security in Europe

    Sponsored by: Okta

    Zero Trust has come a long way since its inception in 2009, but many still have questions. What should Zero Trust look like? How does it affect workloads, networks, people and devices within an organization? How can I begin to implement my own Zero-Trust model? Watch this webcast for answers to these questions and more from Forrester & Okta.

  • Capsule8’s FedRAMP Capabilities

    Sponsored by: Capsule8

    Download this overview to learn about all the key FedRAMP capabilities of Capsule8.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.