ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Is the Cloud Transforming Security?

    Sponsored by: Menlo Security

    As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

  • Respond to the Changing Mobility Landscape

    Sponsored by: Smarsh

    As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.

  • Electronic Communications Compliance Survey Report

    Sponsored by: Smarsh

    Regulatory oversight is growing more sophisticated as the communications technology landscape continues to evolve. In this 2019 research report, Smarsh revels key findings from a survey of financial services professionals responsible for the retention, archiving, and oversight of electronic communications.

  • Extreme AI Security

    Sponsored by: Extreme Networks

    In this brief, learn how ExtremeAI Security can help to defend against cyberattacks by delivering an innovative, AI-powered solution for IoT device security coupled with automated threat remediation and containment.

  • Next-Gen Deception Technology: Moving Beyond Honeypots

    Sponsored by: Illusive Networks

    As the market has evolved, three general types of deceptions have emerged; full interaction decoys (honeypots), partial or low interaction emulated decoys, and endpoint data deceptions. In this white paper, explore each type of deception and review the increasing complexity of deception technology.

  • Isolation: Separating Malware from the Network, Not Devices

    Sponsored by: Menlo Security

    As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.

  • The Security Concerns of Cloud Cryptomining Services

    Sponsored by: Cisco Umbrella

    With the rise in value and popularity of cryptocurrencies, cybercriminals are often targeting them in their attacks. Since cloud mining providers aren’t bound by the same regulations as a traditional bank, it’s more critical than ever for investors to consider the security practices of cloud cryptomining companies. Read on to get started.

  • Your Third-party Risk Management Best Practices Need Updating

    Sponsored by: ServiceNow

    Traditional best practices for third-party risk management are leaving organizations vulnerable. In this e-guide, learn how to improve accuracy of security questionnaires, interview third-party employees about risk and rethink third-party risk management best practices in this changing threat landscape.

  • 9 Email Security Features to Help Prevent Phishing Attacks

    Sponsored by: Cisco Umbrella

    For as long as email exists, phishing will continue to be a threat. While the risks of phishing can’t be eliminated, your organization can enhance its email security to prevent a breach. In this e-guide, discover 9 email security features designed to help prevent phishing attacks.

  • Global Smart Meter Manufacturer Secures Move to Microsoft Intune with Lookout

    Sponsored by: Lookout

    With organizations growing more reliant on remote access capabilities, endpoint security becomes necessary to meet internal and industry security regulations. In this case study, discover how Landis+Gyr, an energy management leader, developed and deployed an advanced mobile security strategy to protect their endpoints

  • Post-Perimeter Security 101: Dawn of a Borderless World

    Sponsored by: Lookout

    With organizations’ networks expanding to accommodate the need for mobile device access, perimeter security tools and practices have changed to include remote endpoints. In this webinar, Lookout’s Chief Security Officer, Aaron Cockerill, shares his expertise in protecting sensitive data in a ‘post-perimeter’ landscape.

  • Combining GRC programs with BC and DR

    Sponsored by: ServiceNow

    In this e-guide, explore the tools used for gathering critical data and discover why Governance, risk management and compliance (GRC) and Business continuity (BC) teams should collaborate to concentrate their efforts in order to build a comprehensive data privacy program.

  • Addressing CCPA: Legacy ERP and Data Privacy Compliance

    Sponsored by: Appsian

    With the 2020 launch date for CCPA looming, organizations are scrambling to ensure they have appropriate security measures in place. In this solution brief, highlight the gaps within current security capabilities and explore how organizations can enhance their legacy ERP apps to ensure CCPA compliance.

  • Your Firewalls Are Dirtier Than You Think

    Sponsored by: FireMon

    Outdated firewall practices can leave vulnerabilities within your organizations network. These gaps can lead to security risks and underperformance. This infographic highlights the 4 steps for improving your firewall cleanup process. Read on to learn more.

  • How to Avoid Disruption by Bridging the Resilience Gap

    Sponsored by: Tanium

    As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.

  • Quantifying the Point Solution Nightmare

    Sponsored by: Tanium

    Forrester, in partnership with Tanium, conducted research into the current state of security and operations tools, teams, and trends to quantify the complexity of endpoint security management and integration. Read on to uncover the results and conclusions.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.

  • Schneider Electric Secures 50,000 Devices with Lookout

    Sponsored by: Lookout

    As organizations shift towards remote access capabilities, securing mobile devices should be a top priority. In this case study, discover how Schneider Electric, a leader in energy management and automation, was able to build a complete mobile security strategy.

  • Core Principles of Cyber Hygiene in a World of Cloud and Mobility

    Sponsored by: VMware

    Many factors lead to security breaches, but there are 5 core principles that can help ensure you won't be the next victim featured on the nightly news broadcast. In this white paper, learn how to address vulnerabilities before they become disastrous.

  • The Top 4 Myths of Policy Compliance

    Sponsored by: FireMon

    This white paper highlights the necessary steps to improve your security posture, achieve continuous compliance, and gain real-time visibility and control to protect your hybrid environments.

  • Top CASB Use Cases

    Sponsored by: BitGlass

    CASBs have quickly risen to prominence and become go-to solutions for securing cloud and mobile. However, because these platforms offer a wide range of capabilities, it can be challenging to identify which use cases are most relevant to an organization’s needs. IT leaders must consider all common CASB use cases to evaluate competing solutions.

  • Configuration Management: Addressing GRC Challenges

    Sponsored by: ServiceNow

    Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).

  • Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout

    Traditional phishing protection methods don’t apply to mobile devices, and cyberattackers are taking exposing this vulnerability. In fact, the rate at which people are falling for phishing attacks on mobile has increased 85% annually since 2011. In this white paper, dissect the myths and facts around mobile phishing.

  • 2019 State of the Firewall

    Sponsored by: FireMon

    The gap between innovation and security can lead to errors, accidental exposure, or service disruptions. In this 2019 state of the firewall infographic, learn why network security risk is at an all-time high and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.