ComputerWeekly.com Research Library

Powered by Bitpipe.com

WS-Security Research

  • 10 Ways to Secure and Accelerate a Modern Workforce

    Sponsored by: Cloudflare

    As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.

  • 13 email threat types to know about right now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • 3 steps to secure remote workers and students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • 3 Ways to Align Your SecOps & Business Priorities with Cisco Endpoint Security

    Sponsored by: Cisco Secure

    Security operations leaders are constantly looking for ways to boost their security capabilities while also meeting business and operational objectives. This article highlights 3 ways organizations can meet both business and security goals with endpoint security from Cisco – read on to learn more.

  • 5 steps to secure home devices & improve productivity for remote work

    Sponsored by: Barracuda

    Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.

  • 7 Ways to Take Cybersecurity to New Levels

    Sponsored by: Cisco Umbrella

    Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.

  • A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology

    Sponsored by: DivvyCloud

    Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.

  • A Security Engineer’s Nightmare

    Sponsored by: Cribl.io

    For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.

  • Access Management is Essential for Cloud Transformation

    Sponsored by: Thales

    Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.

  • Achieving CloudSecOps Maturity

    Sponsored by: DivvyCloud

    When it comes to establishing cloud security operations (CloudSecOps) methods, organizations tend to begin with in-house solutions. In this white paper, discover the limitations of in-house solutions, and realize when it’s time to look elsewhere.

  • Achieving HIPAA Compliance

    Sponsored by: Absolute Software Corporation

    The HITECH Act of 2013 expanded who was considered a covered entity (CE) when it came to HIPAA compliance. This whitepaper provides an introductory overview of key consideration areas and guidance for getting started to help your organization avoid HIPAA and HITECH penalties – download now to get started.

  • Achieving Security and Compliance for SAP HANA in the Cloud

    Sponsored by: Thales

    Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.

  • Addressing Complexity and Expertise in Application Security Testing

    Sponsored by: WhiteHat Security

    The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.

  • ALIGNING CYBER RISK MANAGEMENT WITH BUSINESS PERFORMANCE

    Sponsored by: Coalfire

    Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.

  • All together now

    Sponsored by: ServiceNow

    2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.

  • 5 IAM Trends Shaping the Future of Security

    Sponsored by: Beta Systems

    Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.

  • 7 Elements of Cybersecurity Readiness

    Sponsored by: Cisco Umbrella and Dimension Data

    Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Access Certification: Addressing and Building on a Critical Security Control

    Sponsored by: Oracle Corporation

    This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.

  • Achieving PCI compliance with Dell SecureWorks' security services

    Sponsored by: DellEMC and Intel®

    It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.

  • Adapt Security for Hybrid Cloud Environments

    Sponsored by: Citrix

    In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.

  • Addressing Compliance Initiatives with Center for Internet Security Benchmarks

    Sponsored by: Tripwire, Inc.

    This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.

  • Airport Insecurity: The Case of Lost Laptops

    Sponsored by: Dell India

    This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers.

  • Aligning Security to Provide the Anticipated Business Results

    Sponsored by: AT&T Corp

    This resource looks at some of the more important questions IT managers should consider when implementing a security solutions strategy.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: SearchSecurity.com

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

Browse by Report Type: WS-Security White Papers | WS-Security Multimedia | WS-Security IT Downloads

See more topics related to: WS-Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences