ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies White Papers

  • Crafting a Cybersecurity Incident Response Plan, Step by Step

    Sponsored by: SearchSecurity.com

    Is your cybersecurity incident response plan the best it can be? Inside this expert handbook, Johna Till Johnson, Rob Shapland and Mike Villegas uncover step by step instructions to crafting an effective incident response plan and cloud incident response plan for your organization.

  • Achieve Effective PCI Compliance by Automating Required Controls and Processes

    Sponsored by: Skybox Security

    Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.

  • What is Attribute-Based Access Control?

    Sponsored by: Axiomatics

    Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.

  • Bell Helicopter Enables Attribute-Based Access Control and Authorization

    Sponsored by: Axiomatics

    In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.

  • CW Benelux February 2018

    Sponsored by: ComputerWeekly.com

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

  • Deploying and Managing Security in the Cloud

    Sponsored by: Forcepoint

    As more organizations continue to store sensitive data in the cloud, traditional perimeter based security approaches are no longer viable. But what should replace them? Read this Osterman Research white paper to find out what new security issues the cloud creates, some best practices for protecting sensitive data, and more.

  • Rethinking Data Security

    Sponsored by: Forcepoint

    Read this white paper to find out what new security concerns are driving the need for risk adaptive protection. Then learn about a data protection method that focuses on people for visibility into the data they create and the applications they use.

  • End-User Security Survey: How Common is Confidential File Sharing?

    Sponsored by: Dell and Intel

    To find out how widespread the unsafe sharing of confidential data has become, Dell commissioned a global survey of 2,608 professionals who handle confidential data at companies with 250 or more employees. Click inside to learn the results.

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

  • Software as a SIEM: Improve Your Security Posture by Using Splunk as your SIEM

    Sponsored by: Splunk

    Businesses now require tools that can be used for rapid response detection, incident investigation and coordination of CSIRT breach scenarios. A tool, like Splunk software. Read this white paper and explore what this innovative SIEM has to offer.

  • Four CISO Tribes and Where to Find Them

    Sponsored by: Synopsys

    In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.

  • Your Chance to Get It Right: Five Keys to Building AppSec into DevOps

    Sponsored by: Veracode, Inc.

    Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.

  • The Building Security in Maturity Model Examined

    Sponsored by: Synopsys

    In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.

  • How to Create a Scalable Threat Model

    Sponsored by: Synopsys

    Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.

  • How Does Mobile Device Management Differ from Traditional Security?

    Sponsored by: Seqrite

    In this white paper explore the need for an mobile device management (MDM) system, as well as several best practices for selecting and deploying a comprehensive MDM solution to your enterprise in a way that will be beneficial to security, and intuitive for employees.

  • Threats Posed by Portable Storage Devices

    Sponsored by: Seqrite

    In this white paper, find out if security policies alone are the best solution to mitigate the risks posed by portable storage devices, as well as explore some of the threats that these devices pose if they go uncontrolled.

  • CIO Trends #6: Nordics

    Sponsored by: ComputerWeekly.com

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • Protecting Users and Data with Cloud Security

    Sponsored by: Cisco Umbrella

    In this e-book, learn more about how your educational institution can build a holistic, multi-layer defense against ransomware attacks (especially in regards to protecting against email and Web-based threats).

  • GDPR: What Healthcare Organizations Everywhere Need To Know

    Sponsored by: Absolute

    Enforcement of the new EU GDPR rules is slated to begin in May 2018 and what they require should compel healthcare organizations to start preparing now. Inside, discover 10 recommendations to get started with GDPR compliance.

  • Security and Compliance Strategies for Success

    Sponsored by: Citrix

    Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.

  • What You Need to Know About the General Data Protection Regulation (GDPR)

    Sponsored by: Rapid7

    In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.

  • The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure

    Sponsored by: Google Cloud

    Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.

  • 4 Steps That Help You Protect Your Business

    Sponsored by: Ricoh - HarveyDavid

    As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.