Research Library

Powered by

Cybersecurity White Papers

  • Freedom Security Alliance Dramatically Accelerates Security Response Services

    Sponsored by: ServiceNow

    Explore this case study to gain insight into how Freedom Security Alliance (FSA) improved their cybersecurity strategy by accelerating security response services.

  • Making Sense of the Shared Responsibility Model

    Sponsored by: Oracle Corporation

    According to an Oracle study, 77% of organizations have already adopted cloud services and 10% of those companies describe themselves as heavy users.This resource explores the root cause behind the confusion of the shared responsibility model and offers examples of how enterprises are successfully addressing and embracing the model.

  • Web Application Security in a Digitally Connected World

    Sponsored by: Radware

    According to a recent Ponemon and Radware study, 68% of organizations admit low confidence in their information secure posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.

  • Cloud Apps and Data Security: Are You Safe from the New Threats?

    Sponsored by: Symantec

    How do you plan to conquer cloud chaos within your organization? This resource reveals how a cloud access security broker (CASB) can augment your cloud security approach, while embracing productivity-boosting cloud apps and services.

  • ASEAN IT Priorities 2018

    Sponsored by:

    This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure.

  • Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

    Sponsored by:

    In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now.

  • Active Directory Management and Security

    Sponsored by: One Identity

    Many organizations expect powerful access controls from their networking operating systems. This resource offers optimized Windows security by implementing an effective IAM approach, including, access control, password management and more.

  • Threat Intelligence: Cybersecurity's Best Kept Secret

    Sponsored by: CrowdStrike

    Since threat intelligence comes in many shapes and forms, misunderstandings about what cyber threat intelligence (CTI) entails is common. This resource offers 4 use cases on CTI and explains different categories of CTI and how it can be optimized within security teams.

  • ANZ IT Priorities 2018

    Sponsored by:

    The IT Priorities 2018 survey results underscore what we already know about the ANZ IT landscape - more investments in software and cloud services to buttress digital transformation efforts, including the greater use of artificial intelligence, machine learning and robotics. But there were a few surprises as well

  • Easily Extend Data Loss Prevention to the Cloud

    Sponsored by: Symantec

    To avoid regulation penalties, companies need to know where sensitive and personal data resides. This resource offers a strategy for protecting sensitive data in many areas, including the cloud, endpoints, servers, network and email.

  • 2018 Endpoint Security Survey

    Sponsored by: Tanium

    According to the 2018 PwC Global State of Information Security Survey, many companies vulnerable to cyberattacks remain unprepared to deal with digital intrusions. Explore this endpoint security survey to uncover what organizations think about the challenges of incident response, investigation and remediation on endpoints.

  • How to Improve SIEM Systems with Machine Learning

    Sponsored by: LogRhythm, Inc.

    In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems.

  • Large Network Deployment And Mobile Footprint Strategy

    Sponsored by: Entrust, Inc.

    Explore this case study to gain insight into how a technology provider transitioned to the cloud securely, while protecting sensitive data across its corporate network.

  • Endpoint Detection and Response

    Sponsored by: CrowdStrike

    Utilize this white paper as a guide to understanding EDR, where it fits in your security strategy and what is involved in maturing EDR capabilities so that your organization can derive the greatest benefit.

  • Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere.

    Sponsored by: Juniper Networks

    Inside this white paper, access your cybersecurity checklist to learn why traditional defenses are not working and how to prevent the increase of cybercrime in today's digital era.

  • Is it Time to Shift Left?

    Sponsored by: Nexthink

    88% of IT teams report an increase in events and alerts over the last 12 months, according to the Digital Enterprise Journal. Explore this infographic to uncover 5 benefits of shifting your IT teams to reduce incidents and improve security and compliance.

  • Who needs malware? How Adversaries use Fireless Attacks to Evade your Security

    Sponsored by: CrowdStrike

    According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.

  • Unlock Business Opportunity without Taking Security Risks

    Sponsored by: Juniper Networks

    This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.

  • The CISO'S Guide to Machine Learning & User and Entity Behavioral Analytics

    Sponsored by: Hewlett Packard Enterprise

    Utilize this 40-page CISO's guide to machine learning to learn how combining all of a user's data along with machine learning insights, UBEA becomes a powerful approach to detecting threats inside an organization and empowers analysts with new threat hunting capabilities.

  • The Evolution of RBAC Models to Next-Generation ABAC

    Sponsored by: Axiomatics

    In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.

  • Protect High-Value Assets From Internal Security Risks

    Sponsored by: Hewlett Packard Enterprise

    Access this resource to discover how your organization can gain back network security confidence regarding high-value assets and corporate data with user and entity behavior analytics.

  • 2018 Gambling Security Report

    Sponsored by: iovation, Inc.

    2017 marked the first year in which iOS had the largest share of gambling transactions. With the online gaming market booming, cybercriminals are finding ways to target personal data. Utilize this guide to learn how to prepare for unconventional attacks, prevent fraud, and adhere to regulations within the online gaming industry.

  • Strategies for Successfully Managing Privileged Accounts

    Sponsored by: One Identity

    One of the most important aspects of an IAM program is the securing, management and governance of privileged accounts. This resource uncovers strategies for successfully managing privileged accounts in order to improve your IAM approach.

  • UEBA Use Case: Insider Attack Identification

    Sponsored by: Hewlett Packard Enterprise

    Allow this resource to teach you how network monitoring through behavioral analytics or user and entity behavior analytics (UEBA) can help detect and prevent advanced attacks.

  • Compromised User and Host Detection Using Behavioral Analytics

    Sponsored by: Hewlett Packard Enterprise

    Allow this resource to teach you how network monitoring through multi-dimensional analytics enables the creation of high-fidelity entity risk profiles and shrinks the time to detect attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.