ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices White Papers

  • CISO’s Guide to Multicloud Security

    Sponsored by: ShieldX

    As IT security leaders struggle to keep pace with advancing technology and increasing threats within multicloud environments, adopting an agile approach to cloud security may help solve the problem. In the following guide, uncover a checklist that features recommendations for CISOs interested in bolstering their cloud security strategy.

  • How Does Security Innovation Power Digital Transformation?

    Sponsored by: ZeroNorth

    Digital transformation defined by its seeming-endless search for technological innovation. Unfortunately, security can sometimes be an afterthought for companies looking to stay ahead of the competition. In this white paper, discover how security innovation can augment digital transformation.

  • How to Become Cyber Resilient: A Digital Enterprise Guide

    Sponsored by: Malwarebytes

    Tap into this white paper to explore the current market influences that impact how an organization pursues cyber resilience, the key methods that should be adopted in becoming cyber resilient, and the reasons why cyber resilience can transform an organization into a digital enterprise highly focused on growth.

  • Machine Learning for Effective Micro-Segmentation

    Sponsored by: ShieldX

    Learn how your organization could significantly improve security and decrease total cost of ownership with a micro-segmentation solution that employs machine learning.

  • CW Benelux February-April 2020: Ericsson helps driverless buses hit European streets

    Sponsored by: ComputerWeekly.com

    Ericsson reveals its plans for new technologies including 5G, the internet of things and automation, including driverless buses.

  • A CISO’s Guide to Micro-Segmentation

    Sponsored by: ShieldX

    Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. Download this guide for a comprehensive checklist that can help take the pain out of micro-segmentation adoption.

  • Implementing Effective Cyberprotection Demands New Approaches

    Sponsored by: NWN Corporation

    As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen provider should include.

  • Board Ready Endpoint Resilience in 5 Steps

    Sponsored by: Malwarebytes

    The increasing popularity in mobile workspaces and BYOD devices has transformed the way CISOs have to think about security. With cyberattacks on the rise, implementing endpoint resilience is has become critical. In this e-book, uncover the 5 essential steps to establishing endpoint security and the recommendations for achieving each step.

  • The Future of Identity

    Sponsored by: Mitek Systems, Inc.

    Identity will be far different in the years ahead than in all the years before. What’s changing? For better? For worse? In this white paper, discover Mitek’s point of view about today’s state of identity and how to steer toward a more advantageous future of identity.

  • Why automation is essential for cyber resilience

    Sponsored by: Malwarebytes

    While digital transformation equips organizations to be more productive, it also exposes networks to potential threats. This data sheet outlines key insights into the current cybersecurity landscape and highlights why organizations should consider including automation into their strategy.

  • Protecting Intellectual Property: Black, White, and Shades of Gray

    Sponsored by: InteliSecure

    Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.

  • Pervasive Protection: Enabling Secure Work from Anywhere

    Sponsored by: Malwarebytes

    The digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a security challenge. In this infographic, find out what security managers need to know to defend against today’s cyberattacks.

  • Securing the workplace of the future

    Sponsored by: Tehama

    A stolen or compromised identity is at the heart of many of the major data breaches you read about in the news. With virtual access becoming the norm, ensuring protection for a borderless workplace is critical to maintaining a secure environment. In this white paper, explore 3 key best practices for securing your digital workforce.

  • Datrium Ransomware Protection

    Sponsored by: Datrium

    A recent study found that 1 in 2 companies have suffered a DR event in the past 2 years—and half of those from ransomware. In this white paper, Datrium highlights the categories of ransomware attacks and how to defend against them. Read on to learn more.

  • 6 Practical Approaches to Bridge the Cybersecurity Talent Shortage

    Sponsored by: Alert Logic

    Many organizations are adopting new and emerging technologies faster than they can address related security issues. The situation is further exacerbated by the industry’s skills and resources gap. In this white paper, discover 6 practical approaches to bridge the cybersecurity skills and resource gap in your organization.

  • 2019–2020 Global Application & Network Security Report

    Sponsored by: Radware

    To provide insight into the complex challenges faced by organizations as they seek to balance business agility and security requirements, Radware produced a Global Application & Network Security Report. Download the report to explore real attack data, analyses of developing trends and technologies, and findings from a global industry survey.

  • Security with a Fluid Perimeter

    Sponsored by: Somerville

    While it’s true the perimeter has changed, it has not vanished. Instead, the perimeter has become fluid—changing daily to adapt to the needs of users and modern business, as opposed to the old way of locking down the enterprise. In this white paper, learn how your organization can begin to benefit from this fluid perimeter.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • New Topics on the New Security+ SY0-501 Exam

    Sponsored by: Global Knowledge

    In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.

  • CIO Trends #10: Middle East

    Sponsored by: ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.

  • CIO Trends #10: Nordics

    Sponsored by: ComputerWeekly.com

    Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.

  • CIO Trends #10: Benelux

    Sponsored by: ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.

  • The Right Way to Combat Customer Journey Hijacking

    Sponsored by: Tala Security

    Most IT security teams focus on protecting user data, with little focus on user experience. By implementing a strategy that provides front-end and back-end protection, you can safeguard the interactions customers have with you, prevent the financial and reputational impacts of customer journey hijacking. Read on to get started.

  • Why Your Business Needs to Implement Web Security Standards

    Sponsored by: Tala Security

    With web-based attacks on e-commerce growing in volume and complexity, businesses need to fine-tune their website security tactics to avoid a major breach. This white paper highlights the current website security landscape and provides best-practices for future-proofing your business.

  • ZeroNorth 2019 End of Year Report

    Sponsored by: ZeroNorth

    2019 has been a formative year in cybersecurity – growing security risks and compliance regulations put pressure on organizations to rethink their current strategy. This annual report highlights key statistics to show where the security landscape is trending to help you position yourself for success in 2020.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.