ComputerWeekly.com Research Library

Powered by Bitpipe.com

WS-Security Research

  • 10 Ways to Secure and Accelerate a Modern Workforce

    Sponsored by: Cloudflare

    As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.

  • 13 email threat types to know about right now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • 2020 Cost of Insider Threats Global report

    Sponsored by: Proofpoint

    Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.

  • 2021 Cyber Threat Intelligence Survey

    Sponsored by: DomainTools

    Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.

  • 3 steps to secure remote workers and students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • 3 Ways to Align Your SecOps & Business Priorities with Cisco Endpoint Security

    Sponsored by: Cisco Secure

    Security operations leaders are constantly looking for ways to boost their security capabilities while also meeting business and operational objectives. This article highlights 3 ways organizations can meet both business and security goals with endpoint security from Cisco – read on to learn more.

  • 5 IAM Trends Shaping the Future of Security

    Sponsored by: Beta Systems

    Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.

  • 5 steps to secure home devices & improve productivity for remote work

    Sponsored by: Barracuda

    Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.

  • 5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud

    Sponsored by: Ionic Security

    In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.

  • 7 Ways to Take Cybersecurity to New Levels

    Sponsored by: Cisco Umbrella

    Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.

  • A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology

    Sponsored by: DivvyCloud

    Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.

  • A Security Engineer’s Nightmare

    Sponsored by: Cribl.io

    For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.

  • Access Management is Essential for Cloud Transformation

    Sponsored by: Thales

    Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.

  • Achieving CloudSecOps Maturity

    Sponsored by: DivvyCloud

    When it comes to establishing cloud security operations (CloudSecOps) methods, organizations tend to begin with in-house solutions. In this white paper, discover the limitations of in-house solutions, and realize when it’s time to look elsewhere.

  • Achieving HIPAA Compliance

    Sponsored by: Absolute Software Corporation

    The HITECH Act of 2013 expanded who was considered a covered entity (CE) when it came to HIPAA compliance. This whitepaper provides an introductory overview of key consideration areas and guidance for getting started to help your organization avoid HIPAA and HITECH penalties – download now to get started.

  • Achieving Security and Compliance for SAP HANA in the Cloud

    Sponsored by: Thales

    Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.

  • Addressing Complexity and Expertise in Application Security Testing

    Sponsored by: WhiteHat Security

    The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.

  • Advanced Threat Detection, Focused Investigation And Effective Response

    Sponsored by: Bitdefender

    Traditional endpoint security efforts are growing less and less capable of preventing today’s sophisticated cyberthreats – increasing the need for advanced threat detection, investigated and response capabilities, typically in the form of Endpoint Detection and Response (EDR). Read this datasheet to see what Bitdefender offers in terms of EDR.

  • Aflac Enhances Cyber Threat Intelligence and Integrates Security Ecosystem with Infoblox

    Sponsored by: Infoblox

    In this case study, discover how Aflac, a major insurance provider in the US, was able to tackle a massive transformation across 3 fronts: cloud, threat intelligence, and cybersecurity. Read on to see why they chose Infoblox as their trusted strategic partner and discover the results of Aflac’s 3 major projects.

  • 7 Elements of Cybersecurity Readiness

    Sponsored by: Cisco Umbrella and Dimension Data

    Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Access Certification: Addressing and Building on a Critical Security Control

    Sponsored by: Oracle Corporation

    This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.

  • Achieving PCI compliance with Dell SecureWorks' security services

    Sponsored by: DellEMC and Intel®

    It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.

  • Adapt Security for Hybrid Cloud Environments

    Sponsored by: Citrix

    In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.

  • Addressing Compliance Initiatives with Center for Internet Security Benchmarks

    Sponsored by: Tripwire, Inc.

    This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.

Browse by Report Type: WS-Security White Papers | WS-Security Multimedia | WS-Security IT Downloads

See more topics related to: WS-Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences