ComputerWeekly.com Research Library

Powered by Bitpipe.com

WS-Security Research

  • CW ASEAN: Time to dial up defences

    Sponsored by: ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • Cyber Threats: A perfect storm about to hit Europe?

    Sponsored by: ComputerWeekly.com

    As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.

  • Cyber Vulnerability Index 2012

    Sponsored by: ComputerWeekly.com

    More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.

  • Cybersecurity Essentials Every Law Firm Needs

    Sponsored by: Arctic Wolf

    Organizations like law firms possess vast quantities of highly sensitive information that puts them at the top of hackers' hit lists. Learn about 5 essential security capabilities for protecting company and client data that every firm must have.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • Data Protection Masterclass: New EU Data Protection Regulation

    Sponsored by: ComputerWeekly.com

    Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses.

  • Data protection: A business imperative

    Sponsored by: ComputerWeekly.com

    In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.

  • Dwell Time as a Critical Security Success Metric

    Sponsored by: Armor

    Find out how security professionals can more accurately measure and report on dwell times so that they can identify when a threat enters their environment and work to remediate it faster.

  • E-Guide: PCI DSS 2011: Key themes to watch

    Sponsored by: SearchSecurity.com

    This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: SearchSecurity.com

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • Eguide: Top 10 risks in cloud computing and how to stay compliant

    Sponsored by: SearchSecurity.com

    Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.

  • Cybercrime Battle Basics

    Sponsored by: ThreatMetrix

    This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.

  • Data Leak Protection Planning

    Sponsored by: (ISC)2 UK Ltd

    It's becoming more critical and more challenging to prevent data from leaking outside the organization. Read this ebook for expert tips and advice on plugging the holes in your organization's date security system.

  • Demystifying IT Network Cabling Specifications from 5e to 7A

    Sponsored by: Siemon Company

    This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.

  • Deploying a Wireless LAN

    Sponsored by: BlackBerry

    Many factors must be considered when planning for a WLAN deployment. This paper provides a starting point for posing questions to WLAN equipment and service vendors.

  • Detect and Survive

    Sponsored by: Guidance Software, Inc.

    This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.

  • Dirk Hohndel on Intel and the Linux Foundation

    Sponsored by: Intel

    In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

  • E-Book: Standardizing Business Continuity

    Sponsored by: IBM

    Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

  • E-Book: The Dark Side of Cloud Computing

    Sponsored by: Astaro

    Ask who controls the most powerful computing cloud in operation and Amazon EC2 or one of their competitors springs to mind. However there are other cloud computers which exist today that can directly challenge their might. Botnets and their creators represent a darker side of the Internet where money is a powerful motivator for creativity.

  • E-Guide: Best Practices for Securing Your Network

    Sponsored by: DellEMC and Intel®

    This expert e-guide explains how to effectively secure your network with a practical defense-in-depth approach to security. You’ll also find the critical elements all organizations must review as they consider SaaS products.

  • E-Guide: Expert guide to Access Management Services in the Cloud

    Sponsored by: Intel

    This expert tip takes a look at the steps you can take to utilize cloud services as they become more mainstream and highlights two key architectural and process components of access management services that must be considered in the cloud.

Browse by Report Type: WS-Security White Papers | WS-Security Multimedia | WS-Security IT Downloads

See more topics related to: WS-Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.