ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • The Top Automated Bot Threats and How to Stop Them

    Sponsored by: Radware

    Global bot traffic is escalating and intensifying, and malicious bots can now mimic human behavior to scrape data, take over accounts and commit payment fraud. Staying ahead of these threats is important and thus requires security capabilities to detect and stop them. Learn more now.

  • Third-Party Risk Best Practices Extracting Value from Your Data Map

    Sponsored by: OneTrust

    In aiding companies mature their privacy and security compliance programs, OneTrust heard one question more than any other: “How do I keep my data map up to date?” In this webcast, Jason Sabourin from OneTrust discusses howto overcome this challenge with the OneTrust Vendor Risk Platform to automate recordkeeping.

  • Defining a Shared Responsibility Model for Amazon Web Services (AWS)

    Sponsored by: Alert Logic

    In this e-book, discover a 5-step plan for using the AWS Shared Security Responsibility Model (SSRM) as a foundation for building a "cloud-first" cybersecurity defense plan.

  • Sharpening the Edge: 5G Networks, Edge Computing, IoT and Their Implications on Cybersecurity for Service Providers

    Sponsored by: Radware

    In this white paper, learn how to leverage automation and a new generation of software- and service-defined architectures to improve the digital experience for consumers and businesses alike, all the while providing a secure experience.

  • Why is Third-party Risk Management Essential to Cybersecurity?

    Sponsored by: ServiceNow

    With organizations increasing their reliance on third-party service providers, developing a security strategy that extends beyond their immediate network perimeter is essential to a strong defense. In this e-guide, learn the basics of third-party risk management and what organizations can do meet these challenges.

  • Ionic Machina Cloud Copy Tool

    Sponsored by: Ionic Security

    Download this article for a demo of Ionic Machina and how it can secure data across different cloud providers.

  • Namogoo Helps Top E-Retailer Stop Massive Credit Card Leak to Third Party Services

    Sponsored by: Namogoo

    A major US retail site had a severe incident where customer credit card numbers were leaked to website URLs on sensitive pages along the customer journey. In this case study, learn how Namogoo was able to help this e-retailer address the breach at hand as well as help them mitigate the risk of similar incidents happening in the future.

  • Tanium for Mergers & Acquisitions

    Sponsored by: Tanium

    The mergers and acquisitions outlook continues to show strong growth. However, acquiring companies face a long list of risks that must be assessed and carefully accounted for during due diligence. In this brief, learn how Tanium can help organizations accelerate the due diligence process and reduce risk.

  • Risk Management: 3 Security Changes to Consider for Cloud Adoption

    Sponsored by: ServiceNow

    According to Nemertes Research, this is the year most workloads will be in the cloud versus in on-premises data centers. While the benefits of cloud services can’t be overlooked, these changes also present a security risk. In this e-guide, uncover the 3 changes IT professionals should consider in order to manage third-party risk.

  • Top 9 DDoS Threats your organization must be prepared for

    Sponsored by: Radware

    Open this white paper to find the 9 DDoS threats your organization must be prepared for.

  • Tanium: Unified Cloud Visibility & Control

    Sponsored by: Tanium

    In this brief, find 7 best practices shared by organizations that have been successful in securely migrating to the cloud. Also, learn how Tanium can help you accelerate cloud migration strategies with low risk.

  • The New Era of Personal Data Privacy Policy

    Sponsored by: ServiceNow

    GDPR and CCPA are changing the way organizations can use customer data by giving the power back to the individual. In this e-guide, Dimitri Sirota, CEO and co-founder of BigID, addresses some of the key issues that organizations are facing in the era of data access rights. Read on to key into the insights of an industry expert.

  • 4 Ways to Improve Customer Experience with a Modern Identity Service

    Sponsored by: Okta

    In order to unify the customer experience and drive engagement, there needs to be an identity layer serving as the connective tissue between apps, devices, channels, and experiences. In this white paper, learn how Okta’s modern identity services can help organizations improve their customer experience.

  • Cloudflare for e-Learning Platforms

    Sponsored by: Cloudflare

    Students are increasingly turning to online universities as part of their educational experience. In this brief, learn how Cloudflare provides a scalable, easy-to-use, unified product stack to deliver security, performance, and reliability for your online courses.

  • Tanium for IT Operations Management

    Sponsored by: Tanium

    According to Forrester, 74% of organizations state that the number of endpoint tools they have limits their effectiveness. Patchwork point services are disparate and incomplete in their visibility. In this solution brief, dive deeper into the pains of legacy point services and explore Tanium’s Operations Suite. Read on to learn more.

  • FedRAMP ATO on AWS in Half the Time with Automation – A Customer Story

    Sponsored by: AWS - Coalfire

    Hear how automation methodology, pioneered by Coalfire and AWS, enabled Innovest Systems to be FedRAMP assessment ready in less than six months, allowing the company to quickly unlock new government revenue streams. Continue reading to uncover the key takeaways.

  • Video Course: Expedite Your Path to FedRAMP Compliance on AWS

    Sponsored by: AWS - Coalfire

    This 10-minute online course details the significant benefits of SAO techniques and the role of third-party assessment organizations (3PAOs) in building and documenting FedRAMP-compliant environments. Continue on for three self-paced lessons.

  • Accelerating the Journey to Passwordless Authentication

    Sponsored by: IBM

    A recent study conducted by EMA found that while over 90% of organizations experienced a password policy violation over the past year, a vast majority continued to rely on traditional passwords. Read on to understand some of the vulnerabilities of traditional passwords and uncover sustainable, secure alternatives.

  • Getting Started with Zero Trust Never trust, Always Verify

    Sponsored by: Okta

    There is no silver bullet when it comes to achieving a zero-trust security architecture, but identity and access management is the core technology that organizations can start with on their Zero Trust journeys. Read on to learn the benefits of Zero Trust and what a framework looks like today.

  • Behavioral Biometrics: The Intelligent Safeguard Against Online Fraud

    Sponsored by: Buguroo

    Behavioral biometrics can help users identify people by the unique way they interact with different devices, including computers (keyboard and mouse use), tablets or smartphones. Read on to learn how you can utilize behavioral biometrics techniques and AI deep learning algorithms to detect and predict cybercriminal activities at your organization.

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • Measuring the Impact Of Sierra Wireless Octave

    Sponsored by: Sierra Wireless

    What if there was a way to not only accelerate your Industrial IoT project’s time to revenue by 9 months on an average, realize an ROI of 88%, and achieve material cost savings in both developing and commercializing your Industrial IoT application? This is the question that Forrester explores in its TEI study. Download this report to learn more.

  • Driving IT Hygiene with Tanium

    Sponsored by: Tanium

    Improving IT Hygiene means creating a process to continuously identify assets, risks, and vulnerabilities across an environment and fixing them with speed at scale. In this solution brief, uncover the fundamental aspects of better IT Hygiene and explore Tanium’s IT Hygiene Platform. Read on to learn more.

  • Whirlpool Corporation Takes Tanium Out for a Spin

    Sponsored by: Tanium

    In this case study, discover how Whirlpool leveraged the Tanium platform to discover and act on IT challenges in order to improve their ‘security hygiene’ within their complex environment. Read on to learn more.

  • Claroty Continuous Threat Detection Demo

    Sponsored by: Claroty

    Continuous threat detection (CTD) allows for efficient security with minimal complexity compared to traditional threat detection tools. In this webinar, IT leaders at Claroty discuss the importance of total visibility for data acquisition and provide an in-depth demo of their new dashboard. Continue to watch the demo.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.