ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Industry White Papers

  • Executive Summary: Threat Hunting Made Easy

    Sponsored by: Malwarebytes

    “Threat hunting” may sound like buzzword when you first hear it, but it is a very real practice that allows you to contain suspicious activity, determine if a threat is malicious or benign and remediate with just the click of a button. View this short brief and uncover a threat hunting opportunity your organization could use.

  • Enduring From Home

    Sponsored by: Malwarebytes

    2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.

  • Security and Compliance for a Case Management SaaS

    Sponsored by: Armor

    When a private case management platform evolved into a software-as-a-service (SaaS) offering, a healthcare tech company needed a secure cloud-based solution that could help ensure HIPAA compliance. Read this comprehensive case study to learn about Armor Anywhere, a secure hosting platform designed with security and compliance in mind.

  • Cybersecurity Risk: A Board’s-Eye View Chapter 4

    Sponsored by: PortSys

    Access control is now the single most important aspect of an organization’s security architecture. What if you could view the context of a user’s access request, then have that request analyzed against your security policies for authentication? Read this brief to look at Total Access Control by PortSys.

  • Around the World in 34 Phish: COVID-19 Phishing Examples

    Sponsored by: Inky Technology

    The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.

  • C-Suite Perspectives: Accelerated Cloud Migration but Lagging Security

    Sponsored by: Radware

    By now, “quick acceleration to the cloud compromised by lack of security” is a song you’ve heard 2500 times. But it’s true – businesses have forced their hand when it comes to cloud migration, and the resulting lapse in security has left them vulnerable. Get in the know – read this in-depth report to learn perspectives from C-suite executives.

  • Cybersecurity Risk: A Board’s-Eye View Chapter 3

    Sponsored by: PortSys

    The zero-trust market is becoming saturated, and organizations considering zero trust are having to do their homework when it comes to vendor selection and fit. For many, substantial factors will be ease of deployment and flexibility, as these will lower costs. Read this white paper to learn about zero-trust access by PortSys.

  • Leveraging Public Cloud to Operationalize Security While Confronting Today’s Workplace Realities

    Sponsored by: Splunk

    With the amount of people now working from home, it stands to reason that organizations are searching for ways to amplify their security in a way that is manageable. Cloud-based security may be the answer. Read this custom white paper to learn about the benefits of security through the cloud and how they align with the future.

  • Definitive Guide to Moving Target Defense for Automated Bot Attacks

    Sponsored by: BotRX

    As of February 2020, the total number of websites has topped 1.7 billion, with nearly half of the traffic to those sites credited to bots. Threat actors have evolved malicious bots to where their detection has become near-impossible, even by advanced AI & ML. But there’s another way. Read this white paper to learn about Moving Target Defense.

  • Zero Trust Architecture

    Sponsored by: PortSys

    Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.

  • How to Build a Security Operations Center

    Sponsored by: AT&T Cybersecurity

    A robust SOC requires skilled team members and the right technology to truly enhance security—and as an MSP, you can’t afford to let things slip through the cracks. Jump into this guide to learn how to piece together a Security Operations Center that can ensure airtight security protocols without breaking the bank—and without making compromises.

  • Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider

    Sponsored by: GoSecure

    According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner report to learn what these questions are and more.

  • Phishing Attacks Advanced Techniques That Evade Detection

    Sponsored by: Vade Secure

    The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.

  • Email Security for Microsoft 365

    Sponsored by: Vade Secure

    Cybercriminals are using email to target the weakest link in an organization’s cybersecurity chain: humans. You may have enabled email security add-ons for Microsoft 365, but you’re not as safe as you think. Read this white paper to learn how to keep your email safe from phishing, spear phishing and zero-day attacks.

  • Do You Think Your Endpoint Security Strategy Is Up to Scratch?

    Sponsored by: HP Inc

    IDC surveyed 500 security decision makers and influencers at organizations in key European and North American markets, across vertical sectors from across the spectrum including banking and finance, telco, and energy. Respondents were questioned on key factors pertaining to endpoint security strategy. Read the full survey to learn the results.

  • Ransomware Decoded

    Sponsored by: Cybereason

    Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.

  • The Hacker Infrastructure and Underground Hosting

    Sponsored by: Trend Micro

    How are criminals able to host service and infrastructure on the internet without a takedown or an arrest? What makes them hard to track down? Read this research paper to learn how criminal forums have evolved to adapt to the demands of the underground market and the ways they have enabled easier access to underground hosting.

  • The State of Cloud Security 2020

    Sponsored by: Sophos

    To understand the balance between flexibility and vulnerability in the public cloud, a survey of 3,251 IT managers across 26 countries was conducted. The study shows the ways in which attackers are changing the rules to find new ways into environments and exposing security gaps that were once unknown. Read the full report to go in-depth.

  • Five Ways To Defend Data From Ransomware

    Sponsored by: Veritas

    By 2021, it's estimated a new organization will fall victim to ransomware every 11 seconds, costing businesses apredicted $20 billion globally.

  • Seven Must-Have Endpoint Management Capabilities

    Sponsored by: HCL Software

    When endpoint management systems are effectively integrated with security and IT operations tools, they play a major role in proving compliance, stopping threats, consolidating tools, and protecting brands. Read the study to learn the Seven Must-have Endpoint Management Capabilities.

  • What Every Security Professional Should Know About Third-Party OAuth Apps

    Sponsored by: Proofpoint

    For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.

  • Proofpoint CASB Adaptive Access Controls

    Sponsored by: Proofpoint

    Cloud-based networking has enabled never-before-seen flexibility, but the vulnerability of the cloud and the now-widespread use of unmanaged devices has driven security risk through the roof. A CASB is a viable option to help mitigate this risk. Browse this solution brief to understand the technology behind CASB and why it is gaining popularity.

  • Why Seconds Matter

    Sponsored by: Palo Alto Networks

    Todays' hackers are enjoying threats such as polymorphic malware that can avoid detection by constantly changing its identifiable features. How do security teams get around malleable threats? With inline machine learning, organizations may be able to stop threats while keeping business going. To learn more, read this comprehensive white paper.

  • Pragmatic Zero Trust

    Sponsored by: Capgemini

    There is no consistent view of what ‘zero trust’ means in practice, particularly now that vendor marketing teams have the term firmly within their sights and intend to label everything ‘zero trust’ as a result. Read this short blog post to cut through the marketing hype and learn the history, nature, and possible future of ‘zero trust.’

  • 4-step Work From Home Guide

    Sponsored by: HCL Software

    When a crisis manifests, organizations need to respond quickly or risk insolvency. CISOs and security teams must continue to protect sensitive data while teleworking, and IT and security operations must work together to patch and remediate vulnerabilities. Read this BigFix white paper to learn the 4 core capabilities to support secure telework.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.