ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity White Papers

  • Configuration Management: Addressing GRC Challenges

    Sponsored by: ServiceNow

    Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).

  • Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout

    Traditional phishing protection methods don’t apply to mobile devices, and cyberattackers are taking exposing this vulnerability. In fact, the rate at which people are falling for phishing attacks on mobile has increased 85% annually since 2011. In this white paper, dissect the myths and facts around mobile phishing.

  • The Top Automated Bot Threats and How to Stop Them

    Sponsored by: Radware

    Global bot traffic is escalating and intensifying, and malicious bots can now mimic human behavior to scrape data, take over accounts and commit payment fraud. Staying ahead of these threats is important and thus requires security capabilities to detect and stop them. Learn more now.

  • Why is Third-party Risk Management Essential to Cybersecurity?

    Sponsored by: ServiceNow

    With organizations increasing their reliance on third-party service providers, developing a security strategy that extends beyond their immediate network perimeter is essential to a strong defense. In this e-guide, learn the basics of third-party risk management and what organizations can do meet these challenges.

  • Tanium for Mergers & Acquisitions

    Sponsored by: Tanium

    The mergers and acquisitions outlook continues to show strong growth. However, acquiring companies face a long list of risks that must be assessed and carefully accounted for during due diligence. In this brief, learn how Tanium can help organizations accelerate the due diligence process and reduce risk.

  • Risk Management: 3 Security Changes to Consider for Cloud Adoption

    Sponsored by: ServiceNow

    According to Nemertes Research, this is the year most workloads will be in the cloud versus in on-premises data centers. While the benefits of cloud services can’t be overlooked, these changes also present a security risk. In this e-guide, uncover the 3 changes IT professionals should consider in order to manage third-party risk.

  • Tanium: Unified Cloud Visibility & Control

    Sponsored by: Tanium

    In this brief, find 7 best practices shared by organizations that have been successful in securely migrating to the cloud. Also, learn how Tanium can help you accelerate cloud migration strategies with low risk.

  • The New Era of Personal Data Privacy Policy

    Sponsored by: ServiceNow

    GDPR and CCPA are changing the way organizations can use customer data by giving the power back to the individual. In this e-guide, Dimitri Sirota, CEO and co-founder of BigID, addresses some of the key issues that organizations are facing in the era of data access rights. Read on to key into the insights of an industry expert.

  • Tanium for IT Operations Management

    Sponsored by: Tanium

    According to Forrester, 74% of organizations state that the number of endpoint tools they have limits their effectiveness. Patchwork point services are disparate and incomplete in their visibility. In this solution brief, dive deeper into the pains of legacy point services and explore Tanium’s Operations Suite. Read on to learn more.

  • Tanium for IT Asset Visibility: Optimize Resource Utilization

    Sponsored by: Tanium

    With 68%of enterprises getting at least 1 software audit request annually, asset visibility and management is more critical than ever. In this solution brief, explore the importance of asset management, and discover Tanium’s platform for IT asset visibility. Read on to get started.

  • Preparing for CCPA Compliance

    Sponsored by: Namogoo

    Given the financial and reputational damage of failing to comply with data privacy laws, preparation for the CCPA should be the top priority at any company, regardless of where they are based. In this e-book, explore the components of CCPA, how it compares to GDPR, and 7 steps to CCPA compliance. Read on to prepare your business for 2020.

  • Online Privacy in a World of Third-Party Services

    Sponsored by: Namogoo

    As companies continue to rely on third-party services to enhance the experience of their websites, they risk increasing the vulnerability of customer data. In this e-book, discover the benefits of third-party software, how it works, and why it’s critical to take appropriate security measures when considering a vendor. Read on to learn more.

  • Driving IT Hygiene with Tanium

    Sponsored by: Tanium

    Improving IT Hygiene means creating a process to continuously identify assets, risks, and vulnerabilities across an environment and fixing them with speed at scale. In this solution brief, uncover the fundamental aspects of better IT Hygiene and explore Tanium’s IT Hygiene Platform. Read on to learn more.

  • Whirlpool Corporation Takes Tanium Out for a Spin

    Sponsored by: Tanium

    In this case study, discover how Whirlpool leveraged the Tanium platform to discover and act on IT challenges in order to improve their ‘security hygiene’ within their complex environment. Read on to learn more.

  • Q3, 2019 Cyber Threats and Trends Report

    Sponsored by: Neustar

    Comparing Q3, 2019 to Q3, 2018, the volume of cyberattacks has increased by 241%, with the average attack size decreasing by 28%. As the cyberattacks constantly change, it’s critical for businesses to stay informed. In this report, uncover cybersecurity threats and trends of Q3, 2019 and unlock insights to better prepare yourself for Q4.

  • How Barclays Improved IT Security with the Tanium Communications Architecture

    Sponsored by: Tanium

    Global banks face increasing regulatory pressure, and Barclays, with over 300,000 endpoints across 40 countries, is no exception. Barclays needed a way to unify these endpoints and speed up incident response time. In this case study, follow Barclays’ IT security journey.

  • Computer Weekly - 19 November 2019: Is facial recognition happening too fast?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.

  • Tanium for Detection and Response: Effectively Address and Remediate Incidents

    Sponsored by: Tanium

    Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.

  • Transforming Cybersecurity Strategy for the Age of IoT

    Sponsored by: Forescout

    In a recent study, the Forescout Research Team looks to better understand the current risks and threats by looking at the IoT in a smart building. The report outlines 3 strategies an attacker might use and discusses ways to mitigate them. Read on to dive deeper into the key findings.

  • Define Your Role

    Sponsored by: SentinelOne

    To be a successful CISO is to think on a tactical level, balancing day-to-day security concerns with long-term projects to position your organizations to handle future threats. In this e-book, discover the 12 fundamental questions CISOs should be asking themselves on a frequent basis to help define their role.

  • The Secrets of Evaluating Security Products

    Sponsored by: SentinelOne

    Prioritizing security and choosing the right tools is critical for business to maintain their IT environments. This e-book goes in-depth into the trends and challenges of cybersecurity, as well as criteria for evaluating security tools. Read on to learn more.

  • Tricks of the Storage Trade: How to Build an Effective Cyber Resilience Strategy

    Sponsored by: IBM

    Download this e-book for an insider look at today’s threat landscape, tactical instruction on how to establish a robust cyber resilience strategy, and to examine the critical role the storage infrastructure plays in this process.

  • Worldwide Security Information and Event Management Market Shares

    Sponsored by: Splunk

    According to IDC, the worldwide SIEM software market grew to $3.0 billion in 2018, a 12.4% increase year-over-year. The growth is a response to an organization's need to monitor, investigate and respond to security threats. Download the report to learn more and see what’s ahead for 2020.

  • IBM Identity and Access Management Services: Costs and Benefits

    Sponsored by: IBM

    Forrester recently partnered with IBM in a study designed to better understand the benefits, costs, and risks associated with identity-as-a-service (IDaaS), a cloud-based IAM deployment method. Read on to uncover the key findings from this study.

  • Access Management Vendors: Analyst Report

    Sponsored by: IBM

    SaaS-delivered access management has become the norm, and vendors are including API capabilities for integrating authentication and authorization into applications and services. Gartner recently published a Magic Quadrant report for Access Management, which evaluates and compares various AM providers. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.