ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Deception Technology: A Strategic Imperative for Detection and Response

    Sponsored by: Verizon

    Learn how to detect and respond to attacks faster and how Verizon can help you leverage deception security in order to protect your business against cyber threats.

  • Vulnerability Management Trends and the Remote Work Force

    Sponsored by: Crowdstrike

    In this webcast, CrowdStrike outlines some of the major trends in vulnerability management and shows how organizations in today’s circumstances should protect all workstations, regardless of where their employees are located.

  • How Velocity Can Impact Cybersecurity Strategy

    Sponsored by: Verizon

    Hackers move quickly as they test cyber security defenses for weaknesses. Once they find a way in, they can wreak havoc in a matter of minutes. Here are five ways to stop them or limit the damage they can do.

  • Innovation Insight for Extended Detection and Response

    Sponsored by: Trend Micro

    Access this white paper for an overview of XDR and weigh its pros and cons to decide whether it could be an effective solution for your organization.

  • Why Cyber Risk Visibility is the Key to Security

    Sponsored by: Verizon

    As companies move from on-premise legacy systems to the hybrid cloud, they are massively increasing their attack surface. More places to attack mean that it’s more likely that a vulnerability will be missed. That’s why the first step to effective cyber risk management is to prioritize visibility. Read on to find out how.

  • Cequence Security: API Sentinel Podcast

    Sponsored by: Cequence

    Tune into this podcast from Cequence Security to learn how API Sentinel can help you identify all your APIs, uncover security risks and address them to eliminate potential fraud or data loss.

  • The Titus Standard: How Metadata Will Accelerate Your Data Protection Strategy

    Sponsored by: TITUS

    While the actual contents of files are crucially important to businesses, the metadata that contains information about these files is equally essential. In fact, the intelligent business can use that metadata to establish better security measures. Read on to learn how companies can classify and protect files using metadata information.

  • Titus data identification

    Sponsored by: TITUS

    The increasingly complex compliance landscape makes it harder for organizations and users to delineate what defines sensitive data. Download this solution brief for a closer look at Titus’ Data Identification tool – which can help organizations and users identify sensitive data within emails to better understand and mitigate data risk.

  • Improve Digital Forensics and eDiscovery Efficiencies

    Sponsored by: IANS Research

    Learn how your security team can become more cost effective with digital forensics and eDiscovery.

  • 5 Questions Every CIO Must Answer in the Coronavirus Age

    Sponsored by: Hitachi Vantara

    The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).

  • Remote Workers

    Sponsored by: TITUS

    The workplace disruption due to COVID-19 has led to two concurrent explosions: an uptick in remote work, and an uptick in vulnerabilities and cybercrime surrounding remote work. Check out this Titus white paper to learn some strategies to keep your employees, and company, both protected and productive during these strange times.

  • 5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile

    Sponsored by: NowSecure

    Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.

  • API Sentinel: Continuous API Visibility and Risk Monitoring

    Sponsored by: Cequence

    Tune into this webinar from Cequence Security to learn how API Sentinel can help you identify all your APIs, uncover security risks and address them to eliminate potential fraud or data loss.

  • Lay Your Security Tech Foundation

    Sponsored by: TITUS

    Today’s data breaches have legal, financial and reputational implications, and overcoming this challenge is made more difficult by increasingly complex and stringent regulations. Download the following Forrester report, which outlines 4-step approach to help organizations get started with building their strategies around these challenges.

  • The State of Cyber Security in the Legal Sector

    Sponsored by: BlueVoyant

    Law firms are a critical industry that possess high-value information, making them a lucrative target for cybercriminals. The following report provides a comprehensive analysis of the state of cybersecurity and cyberthreats in the legal sector. Read on to unlock the results.

  • Capsule8 Enterprise Linux Protection

    Sponsored by: Capsule8

    To keep up as enterprises modernize around them, security teams need to adapt their approach to focus on achieving protection across their entire enterprise infrastructure across all environments. Download this product brief to discover the key features of Capsule8 Protect, designed to uphold security on any system and at scale.

  • MITRE ATT&CK Framework Q&A with Forrester Research

    Sponsored by: Capsule8

    In response to the growing popularity and adoption of the MITRE ATT&CK framework, John Zelonis, principal analyst at Forrester Research, provides answers to commonly asked questions and offers further insight into the MITRE ATT&CK framework, including: Who should use the framwork, where priorities should begin & how it falls short.

  • Managed Detection and Response (MDR+)

    Sponsored by: BlueVoyant

    As threat detection, isolation and mitigation becomes increasingly complex, organizations look to third-party vendors for managed detection and response tools and capabilities. This solution brief highlights the key capabilities of at BlueVoyant’s Managed Detection and Response (MDR+) for Microsoft Defender ATP – read on to unlock the features.

  • Doing DevSecOps Right: Implementation & the Metrics that Matter

    Sponsored by: Capsule8

    DevSecOps is a crucial part of an emerging security and IT strategy, one which realizes that security has to be implemented early, often, and in a more flexible manner. But how can your company adopt these practices, and then measure their effectiveness? Watch this Capsule8 video to learn some effective DevSecOps principles and metrics.

  • The Cloud Native Compliance Playbook: Strategies for the Enterprise

    Sponsored by: Capsule8

    Regardless of organizational size or desired environment, security and compliance challenges are consistently the largest obstacles on the road to cloud native adoption. The Cloud Native Compliance Playbook: Strategies for the Enterprise explores key challenges and best-practices to help organizations build their cloud security strategy.

  • Enabling Secure, Fast, and Immersive Gaming Experiences

    Sponsored by: Cloudflare & Safenames

    In this white paper, learn how automating underlying infrastructure tasks and security functions with services such as Cloudflare’s Solutions for Gaming can help enhance performance and security, reduce time to market, minimize expenses, and free up developers to focus on their core competency: building games.

  • Understand How to Maximize Security and Performance of Your Online Brand and Platforms in Five Steps

    Sponsored by: Cloudflare & Safenames

    As cyberattacks increase in frequency around the world, it is imperative to choose a cloud platform that provides you with the security that you need. Check out this Safenames whitepaper to learn how to conquer some of the challenges that you’re likely facing in this increasingly dangerous online world.

  • Artificial Intelligence in Cybersecurity

    Sponsored by: Spin Tech

    Given the nature of artificial intelligence, it’s no surprise to see organizations integrating AI capabilities into their cybersecurity strategies. This webinar provides a comprehensive overview of AI and its role in cybersecurity, offering expertise for evaluating AI-based cybersecurity tools and vendors.

  • Cybersecurity Evolved: The Sophos Business Impact

    Sponsored by: Sophos

    Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.

  • Secure SD-WAN: The Launch Pad into Cloud

    Sponsored by: Barracuda

    Most organizations intend to leverage the many benefits of SD-WAN, including stronger security, better performance, improved user experience and cost optimization. However, like many emerging technologies, SD-WAN does not come without its challenges. In this research report, explore adoption trends of SD-WAN across the globe.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.