ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security White Papers

  • Breaking the Tension Between IT and Security

    Sponsored by: VMware International Unlimited Company

    IT and security are currently in a bad marriage. Efforts must be made for the two to be more closely aligned for organizations to have future success. Forrester has reported that unifying and consolidating IT and security will make for fewer breaches, better reaction time to threats, and improved IT hygiene. Read their report to learn more.

  • Adapting Networks in Critical Times

    Sponsored by: Oracle Communications

    With what is at hand, businesses must be assured then reassured that their networks and information are managed, compliant and most of all secure. This message from Oracle Communications demonstrates their commitment to the business continuity of their customers in a time of uncertainty.

  • Employ AI for Cybersecurity, Reap Strong Defenses Faster

    Sponsored by: SearchSecurity.com

    Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.

  • False cents of security: The price of being compromised

    Sponsored by: ComputerWeekly.com

    Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.

  • Innovation in retail: Using cybersecurity as a competitive advantage

    Sponsored by: Capgemini

    While cybersecurity measures enable retail organizations to identify and mitigate potential threats, it’s important to consider that data protection can be considered a competitive advantage. In this blog post, explore the importance of security for retail consumers, how GDPR is shaping the industry, and the role of SOCs in quantifying risks.

  • Foundation for Digital Transformation

    Sponsored by: Infovista

    In this EIQ report, gain an understanding of the impact of new consumer expectations on applications, digital transformation and networking systems initiatives within retail, manufacturing and banking/finance industries.

  • The Titus Times: The CEO & CTO

    Sponsored by: TITUS

    In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.

  • The Vital Role of Security in Digital Transformation

    Sponsored by: TITUS

    A survey conducted by Market Strategies Internal showed that 78% of ITDMs believe that the success of their digital transformation relies heavily on strong IT security and data protection. In this research report, explore 2 different security professional personas and explore how they view digital transformation, security and data protection.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • April ezine: SD-WAN more than just networking

    Sponsored by: MicroScope

    An issue covering SD-WAN, storage innovations and opportunities for channel growth

  • Implementing Agile Security Response

    Sponsored by: ServiceNow

    Data breaches constantly threaten enterprises today. The biggest challenge that organizations face is coordinating incident response across the organization. Download this resource for access to an essential security operations solution checklist to help your organization better respond to security threats and vulnerabilities.

  • December ezine: Tech for good

    Sponsored by: MicroScope

    Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same

  • September ezine: Thinking digital in the world of storage

    Sponsored by: MicroScope

    The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry

  • The difficulties of defending against web tracking

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.

  • Advance Your Career with the Right Cloud Security Certifications

    Sponsored by: TechTarget

    The fact is that IT security pros with cloud computing expertise are becoming the highest paying jobs in the industry, especially for those with the proper cloud security certifications. In our expert guide, Cloud Security Certifications 101, find out why. To unlock access to this expert guide, participate in our 5-10-minute cloud security survey.

  • The Top Cyber Security Trends in ANZ in 2017

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.

  • MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate

    Sponsored by: MicroScope

    An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

  • Facing up to emerging technology: Risks and benefits

    Sponsored by: SearchCIO

    Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.

  • Incident response playbook in flux as services, tools arrive

    Sponsored by: SearchSecurity.com

    The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.

  • Recent Ransomware Attacks Got you? Don't Cry; Fight Back!

    Sponsored by: SearchSecurity.com

    Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.

  • Get Smart About Threat Intel Tools and Services

    Sponsored by: SearchSecurity.com

    Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.

  • ITSM strategy for an agile, secure digital transformation

    Sponsored by: SearchCIO.com

    As digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    Sponsored by: SearchSecurity.com

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

  • Build your Content Security and Document Management Plan

    Sponsored by: Adobe

    In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.