ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft White Papers

  • Twitter Phone Spear Phishing Attack

    Sponsored by: Lookout

    On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.

  • Predictive Identity: A Key Enabler for a Successful Merger or Acquisition

    Sponsored by: SailPoint Technologies

    This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.

  • Onfido & Sidehide Case Study

    Sponsored by: Onfido

    Sidehide is enabling “one-click hotels”, offering users a seamless booking and check-in experience. But in order to build this, Sidehide identified three challenges to overcome: local regulations, fraud, and user experience. In this case study, find out how Onfido allowed them to combat these challenges with trusted identity.

  • Aruba ESP With Zero Trust Security: Security for the Edge

    Sponsored by: Aruba Networks

    In this brief, learn how Aruba ESP with Zero Trust Security can help improve an organization’s overall network security posture by applying a more rigorous set of security best practices and controls to previously trusted network resources.

  • Tax Scammers: Gone Phishing This Tax Season

    Sponsored by: Farsight Security

    Each tax season, thousands of Americans are scammed out of millions of dollars. In fact, according to an FTC report, nearly 1 in 10 people were victims of imposter scams last year, amounting to roughly $667 million lost. The following white paper highlights common tax scams to watch out for (according to the IRS) and how to prepare for them.

  • Security Access Controls Over Identities Must Be Priority

    Sponsored by: SearchSecurity.com

    No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.

  • Secure Transformation: Replacing Remote Access VPN with Prisma Access

    Sponsored by: Palo Alto Networks

    Remote access VPN has been an enterprise network staple for years; however, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. In this white paper, learn about the limitations of VPNs and how Prisma Access can help provide secure access to all applications.

  • The Network for the Digital Business Starts with the Secure Access Service Edge (SASE)

    Sponsored by: Cato Networks

    Networking and security are slowing down the business as silos, built decades ago, are stretched and patched to accommodate emerging business requirements. In this white paper, learn how networking and security can become part of the IT platform for the digital business with a single cloud-based service: Secure Access Service Edge (SASE).

  • Finds Cost- and Time-Savings with IdentityNow

    Sponsored by: SailPoint Technologies

    Banking is built upon the transactions it performs daily, and Orrstown Bank needed a solution that could be quickly deployed while also protecting the data and integrity of its transactions. In this case study, learn how Orrstown Bank was able to meet these needs by deploying SailPoint IdentityNow.

  • How to Know It’s Time to Change Your Identity Vendor

    Sponsored by: SailPoint Technologies

    Changing identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.

  • 4 Ways SailPoint Predictive Identity Puts You in Control

    Sponsored by: SailPoint Technologies

    As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.

  • Creating an Identity-Aware Organization from Infrastructure to Users

    Sponsored by: SailPoint Technologies

    Cybercriminals are no longer just hacking through your firewall to gain entry to your infrastructure. They have found another, easier path in – your users. In this white paper, learn how identity management is key to ensure a secure, compliant and efficient infrastructure.

  • How to Survive a Bank Robbery

    Sponsored by: Splunk

    Today's organizations are plagued by a myriad of cyberthreats designed to target their sensitive data and disrupt their business operations. Is your organization prepared in the event of a cyberattack? This guide is designed to prepare you to survive the 10 most common threats. Read on to learn more.

  • A Framework for Cybersecurity and Compliance

    Sponsored by: OneNeck IT

    In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.

  • Pogo Paradox: Is Your Infrastructure Your Worst Enemy?

    Sponsored by: PortSys

    In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.

  • Take a Better TAC to Protect RDP

    Sponsored by: PortSys

    Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.

  • Making the Business Case for Zero Trust Access

    Sponsored by: PortSys

    Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.

  • New Tech: Early Adopters Find Smart 'Zero Trust' Access Improves Security Without Stifling Innovation

    Sponsored by: PortSys

    Abused logon credentials continue to fuel the never-ending escalation of cyberattacks. However, the Zero Trust approach could be well on its way to changing this. In this blog, uncover key findings from a recent discussion Byron Acohido of The Last Watchdog, had with PortSys' CEO Michael Oldham about Zero Trust.

  • Norfolk County Council Bolsters Productivity with IdentityIQ

    Sponsored by: SailPoint Technologies

    Norfolk County Council (NCC) needed to prioritize an identity-centric security program that alleviated the growing concern over disparate systems and manual processes. In this case study, learn how NCC leveraged SailPoint to manage the identities working within their organization for all types of employment.

  • Online Retail Threats Credential Stuffing

    Sponsored by: Shape Security

    In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.

  • Zero Trust Access Today's IT Security Falls Short

    Sponsored by: PortSys

    78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.

  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Sponsored by: Menlo Security

    Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: Comforte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.