ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity White Papers

  • Enhancing the Modern Workplace with Hardware-Enforced Security

    Sponsored by: Servium

    An exceptional user experience, no matter where work gets done is fundamental to the modern workplace. However, balancing this pursuit and the freedoms it entails with robust security is tough for IT teams. In this white paper, learn why a different approach to security is needed to support the modern workplace.

  • Peer Insights: Identity Governance and Administration

    Sponsored by: SailPoint Technologies

    This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.

  • Privileged Access Management (PAM) as a Service For Dummies, CyberArk Special Edition

    Sponsored by: CyberArk Software, Inc

    Has your organization suffered from a preventable vulnerability? Has one your employees committed a cybercrime even though they were granted access? Does your architecture have security gaps that need closing? Read ‘Privileged Access Management (PAM) as-a-Service for dummies’ to find out how to secure accounts and reduce risk.

  • Identity Governance & Administration (IGA)

    Sponsored by: SailPoint Technologies

    In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.

  • Privileged Access Management

    Sponsored by: CyberArk Software, Inc

    Privileged access management (PAM) is becoming increasingly popular for enhancing organizational risk management and cybersecurity strategies. The following report provides an in-depth look into PAM offerings, vendors and market segments to help buyers get started on their journey. Read on for an in-depth look into the PAM landscape.

  • Cloud with Confidence: Re-Imagine Cloud Security

    Sponsored by: Checkpoint Software Technologies

    According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.

  • Phishing Factories Exploit Trust to Attack Businesses

    Sponsored by: Akamai Technologies

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • Removing Barriers Between IT And Security

    Sponsored by: VMware International Unlimited Company

    Discussions about IT and security usually revolve around their respective technologies and how they would function independently of one another. But Forrester has reported that the #1 priority in EMEA is to drive collaboration and alignment between IT and security. What else did they have to say on the matter? View this infographic to find out.

  • Return-to-office plans stress safety, security, collaboration

    Sponsored by: SearchCIO

    In the wake of the COVID-19 pandemic, return-to-office plans include a myriad of safety measures that have become part of the daily routine. Learn how companies balance advanced technologies and the needs of employees with restructured office environments and a suddenly larger remote workforce.

  • SailPoint Predictive Identity

    Sponsored by: SailPoint Technologies

    AI and machine learning capabilities enable unmatched efficiency and automation across cybersecurity tools and tactics. Download this report for an in-depth look at Predictive Identity, SailPoint’s identity governance SaaS platform that harnesses the power of AI to assess risk and offer recommendations.

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

  • Protecting Intellectual Property with Data Access Governance

    Sponsored by: SailPoint Technologies

    In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.

  • SIG - AV-TEST: DNS-Layer Protection and Secure Web Gateway Security Efficacy Test Results

    Sponsored by: Cisco Umbrella

    AV-TEST is an independent research institute for IT security. In November and December 2019, AV-TEST performed a review of Cisco cloud security solutions alongside comparable offerings. The test was commissioned by Cisco to determine the malware protection and phishing block capabilities of all vendors. Read this report to see the results.

  • BlackBerry MITRE ATTACK APT29 Evaluation

    Sponsored by: BlackBerry

    In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.

  • Video: Understanding bots and their role in credential stuffing

    Sponsored by: Akamai Technologies

    In this talk, Akamai security strategist Siddharth Deshpande will walk you through the dark web economy for malicious bots used in Credential Stuffing attacks and discuss options for effective Bot Management.

  • Duarte Unified School District Protects Students while Fostering Engagement

    Sponsored by: Absolute Software Corporation

    Luckily for the Duarte Unified School District, when the Coronavirus pandemic first broke out, the LA County educational district already had in place a robust one-to-one student device program. However, this didn’t address the access, connectivity, and student support challenges. Read this case study for more on Duarte’s COVID-19 response.

  • The Future of Security and Compliance Starts Here

    Sponsored by: SailPoint Technologies

    The same capabilities that enable improvements during a digital transformation can also lead to significant risk, if not properly addressed. In this solution overview, take a closer look at SailPoint Predictive Identity, which leverages the power of AI and machine learning to simplify IAM and enable you with advanced governance capabilities.

  • Intelligent Cloud Identity Platform

    Sponsored by: SailPoint Technologies

    To address the cybersecurity challenges that result from a undergoing a digital transformation, organizations are implementing intelligent identity and access management practices. This solution brief provides an in-depth look at the key features and capabilities of SailPoint’s IdentityIQ platform, read on to see the benefits.

  • Cybersecurity and Education: The State of the Digital District in 2020

    Sponsored by: Absolute Software Corporation

    K-12 schools are rapidly embracing technology to augment current curriculums by enabling innovative learning paths for students in the event they can’t be in the classroom. This report provides an overview of the key risks, trends and recommendations from Absolute’s recent study into the state of digital education.

  • 2020 SonicWall Cyber Threat Report

    Sponsored by: SonicWall

    So far this year, intrusion attempts are up 19% to 2.3 trillion. IoT malware attacks are up 50%. And according to the FBI, daily cybercrimes have increased 75% since COVID-19 began. In reading this white paper, you will learn powerful statistics and trends, such as these, to make strong decisions in protecting your network and users.

  • Implementing the NIST Cybersecurity Framework in Government

    Sponsored by: Absolute Software Corporation

    The NIST Cybersecurity Framework outlines 5 functions that, when implemented properly, help organizations drive efficiency while ensuring data security. In this whitepaper focuses on how the NIST Cybersecurity Framework can – and should – be implemented to address the rising cybersecurity challenges in the public sector.

  • StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure

    Sponsored by: Bitdefender

    This investigation report compiles Bitdefender’s key findings from the information they gathered on StrongPity, a threat group that renown for their government-sponsored population surveillance and intelligence attacks. Download the report to learn more about StrongPity’s motives, tactics and infrastructure.

  • SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise

    Sponsored by: SailPoint Technologies

    The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.

  • Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences

    Sponsored by: DivvyCloud

    In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.

  • The Cost of a Data Breach in Healthcare: Settlements Involving Lost or Stolen Devices

    Sponsored by: Absolute Software Corporation

    Protected Health Information (PHI) has quickly become the most attractive target for cybercriminals – especially full patient dossiers that include driver’s licenses, health insurance information and other sensitive data. Download this white paper for a look at specific data breaches and discover a set of key trends and lessons learned.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.