Subscribe: Most Popular White Papers and WebcastsData Security Research
Preview: Most Popular White Papers and WebcastsData Security Research

Most Popular White Papers and Webcasts Data Security Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Mon, 19 Feb 2018 13:45:18 EST

Last Build Date: Mon, 19 Feb 2018 13:45:18 EST


The Future of Privileged Management

Wed, 14 Feb 2018 24:00:00 EST

The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn about where privileged management is heading and uncover an approach to securing privileged accounts. Published by: One Identity

Regulating Privileged Access: When to Require Human Approval Workflows

Wed, 14 Feb 2018 24:00:00 EST

Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity Published by: One Identity

Identity Analytics – A more Collective Defense

Wed, 14 Feb 2018 24:00:00 EST

As technology evolves, managing access is especially difficult when dealing with users, groups, computers, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program. Published by: One Identity

Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

Fri, 16 Feb 2018 24:00:00 EST

In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now. Published by:

What to Know about SIEM as a Service

Tue, 06 Feb 2018 24:00:00 EST

Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach. Published by: LogRhythm, Inc.

User Behavior Analysis & SIEM

Wed, 07 Feb 2018 24:00:00 EST

In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis. Published by: LogRhythm, Inc.

How to Improve SIEM Systems with Machine Learning

Wed, 07 Feb 2018 24:00:00 EST

In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems. Published by: LogRhythm, Inc.

CW ASEAN – February 2018: European data law: be aware and prepare

Thu, 08 Feb 2018 24:00:00 EST

Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses. Published by:

CW ANZ – February 2018: Prepare for EU data law

Thu, 08 Feb 2018 24:00:00 EST

Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws. Published by:

Computer Weekly Buyer's Guide to EU General Data Protection Regulation

Wed, 07 Feb 2018 24:00:00 EST

In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules. Published by:

Five Milestones to GDPR Success

Tue, 06 Feb 2018 24:00:00 EST

The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant. Published by: Proofpoint, Inc.

End-User Security Survey: How Common is Confidential File Sharing?

Fri, 29 Dec 2017 24:00:00 EST

To find out how widespread the unsafe sharing of confidential data has become, Dell commissioned a global survey of 2,608 professionals who handle confidential data at companies with 250 or more employees. Click inside to learn the results. Published by: Dell and Intel

2018 Security Predictions for an Unpredictable World

Wed, 24 Jan 2018 24:00:00 EST

Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare. Published by: Whitehat Securities

Getting the Most out of your AppSec Program

Tue, 23 Jan 2018 24:00:00 EST

According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program. Published by: Whitehat Securities

Enabling Healthcare with Trusted Access

Thu, 18 Jan 2018 24:00:00 EST

Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry. Published by: Duo Security

Essential guide to dealing with a data breach

Wed, 03 Jan 2018 24:00:00 EST

Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences Published by:

Cloud-based backup services are a safety net in tricky times

Tue, 05 Dec 2017 24:00:00 EST

Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides. Published by:

Gamma International: The Macedonia files - Source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

Thu, 23 Nov 2017 24:00:00 EST

This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia. Published by:

Introducing the Delphix Dynamic Data Platform

Wed, 15 Nov 2017 24:00:00 EST

IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes. Published by: Delphix

Step Up Your Security and Privacy with Data Masking

Wed, 15 Nov 2017 24:00:00 EST

With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is not an easy task, especially with new mandates like GDPR and HIPAA. This webcast explores how you can use data masking to keep data protected. Published by: Delphix

Essential Guide: What the EU Data Protection Regulation changes mean to you

Mon, 20 Nov 2017 24:00:00 EST

This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation. Published by:

Essential Guide: Securing hybrid IT infrastructure

Thu, 16 Nov 2017 24:00:00 EST

In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud. Published by:

CW ASEAN – November 2017: How managed security services help to reduce cyber risk

Fri, 10 Nov 2017 24:00:00 EST

In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of. Published by:

Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

Fri, 27 Oct 2017 24:00:00 EDT

In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now. Published by:

Multi-factor Authentication for dummies

Fri, 27 Oct 2017 24:00:00 EDT

The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more. Published by: iovation, Inc.

Five Reasons to Reevaluate Your Current Backup Approach

Fri, 27 Oct 2017 24:00:00 EDT

By downloading this resource, you'll discover 5 reasons you may need to reevaluate your current backup approach. Read on to see a platform that enables instant recovery from ransomware, supports all major hypervisors, and more. Published by: Acronis

Case Study: Quadruple Backup Speed and Blocks Ransomware Attacks with Backup Platform

Tue, 24 Oct 2017 24:00:00 EDT

This case study explores how Johnson Electric, one of the world's largest electrical providers, protected their organization against ransomware targeting their large amount of data. Published by: Acronis

How Cloud is Reshaping Digital ECM Strategies

Thu, 19 Oct 2017 24:00:00 EDT

In this expert e-guide, we explore some of the new and evolving trends in cloud-based ECM. Discover how to prioritize the capabilities that matter most to your content management strategy and weigh considerations like on-prem vs. cloud deployments, AI capabilities, advanced collaboration tools, security, and more. Published by: Citrix

Balancing ECM User Experiences with IT Control and Security

Thu, 19 Oct 2017 24:00:00 EDT

In this expert e-guide, we explore how you can deliver quality ECM user experiences without sacrificing IT control or security. Learn how to strike the balance and discover 7 features that help you deliver a better user experience. Published by: Citrix

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information

Fri, 13 Oct 2017 24:00:00 EDT

According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches. Published by: HID Global

Complying with GDPR: What All Organizations Need to Know

Wed, 18 Oct 2017 24:00:00 EDT

With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more. Published by: Absolute

Protecting Data After the Digital Disruption

Wed, 04 Oct 2017 24:00:00 EDT

Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more. Published by: Proofpoint, Inc.

Managing Access to Keep Privileged Users' Credentials Secure

Wed, 20 Sep 2017 24:00:00 EDT

Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list. Published by:

Focus: Datacentre Uptime

Tue, 12 Sep 2017 24:00:00 EDT

In this e-guide, we take a closer look at some high-profile datacentre outages of recent times and assess the toll they took on the companies involved, and look into what providers and consumers can do to protect themselves from downtime. Published by:

GDPR: The State of Play

Mon, 11 Sep 2017 24:00:00 EDT

An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play. Published by:

CW Europe – September-November 2017

Thu, 07 Sep 2017 24:00:00 EDT

In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years. Published by:

Could the WannaCry Decryptor Work on Other Ransomware Strains?

Tue, 29 Aug 2017 24:00:00 EDT

After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains. Published by: Cisco Umbrella

CW Nordics August 2017

Thu, 24 Aug 2017 24:00:00 EDT

The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more. Published by:

A Computer Weekly Buyer's Guide to Customer Experience

Thu, 10 Aug 2017 24:00:00 EDT

Discover how to craft data-first CRM strategies and get tips about coordinating data sources for effective CRM, 5 ways to reduce risks for Salesforce deployments, and the pros and cons of current CRM software offerings. Published by:

Achieving Security Through Data-Driven Intelligence: Splunk for Defense Overview

Thu, 10 Aug 2017 24:00:00 EDT

In this product guide, learn how Splunk can be used for security purposes, allowing you to achieve security and efficiencies through data-driven intelligence. Published by: Splunk

CW Benelux August 2017

Thu, 10 Aug 2017 24:00:00 EDT

The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today. Published by:

Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR

Tue, 18 Jul 2017 24:00:00 EDT

Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals. Published by:

CW ASEAN – July 2017: Be alert to threats

Thu, 13 Jul 2017 24:00:00 EDT

With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy. Published by:

CW ANZ – July 2017: Cyber security plan bears fruit

Thu, 13 Jul 2017 24:00:00 EDT

Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape. Published by:

A Computer Weekly Buyer's Guide to EU General Data Protection

Tue, 30 May 2017 24:00:00 EDT

The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare. Published by:

Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems

Tue, 13 Jun 2017 24:00:00 EDT

In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends. Published by:

Middleware and Operating System Machine Data

Tue, 23 May 2017 24:00:00 EDT

This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more. Published by: Splunk

Political Turmoil Threatens Global IT Services Sector

Tue, 16 May 2017 24:00:00 EDT

In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now. Published by:

The Investigatory Powers Act 2016 and Internet Connections Records

Tue, 09 May 2017 24:00:00 EDT

This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016. Published by:

Computer Weekly – 9 May 2017: Casting the IT skills net wider

Tue, 09 May 2017 24:00:00 EDT

In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now. Published by: