Subscribe: Most Popular White Papers and WebcastsData Security Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
cloud  computerweekly  data protection  data  gdpr  guide  protection  published computerweekly  published  security  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsData Security Research

Most Popular White Papers and Webcasts Data Security Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Mon, 20 Nov 2017 16:00:16 EST

Last Build Date: Mon, 20 Nov 2017 16:00:16 EST


Step Up Your Security and Privacy with Data Masking

Wed, 15 Nov 2017 24:00:00 EST

With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is no longer an easy task with mandates like the new GDPR or HIPAA. Companies must focus on proactively protecting the sensitive information - that's where data masking comes in. Published by: Delphix

How Can Privileged Access Accounts Be Managed in Large Companies?

Mon, 13 Nov 2017 24:00:00 EST

According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access. Published by: One Identity

How can organizations get control over privileged identity management?

Tue, 14 Nov 2017 24:00:00 EST

Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information Published by: One Identity

Essential Guide: What the EU Data Protection Regulation changes mean to you

Mon, 20 Nov 2017 24:00:00 EST

This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation. Published by:

Essential Guide: Securing hybrid IT infrastructure

Thu, 16 Nov 2017 24:00:00 EST

In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud. Published by:

CW ASEAN – November 2017: How managed security services help to reduce cyber risk

Fri, 10 Nov 2017 24:00:00 EST

In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of. Published by:

Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

Fri, 27 Oct 2017 24:00:00 EDT

In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now. Published by:

Multi-factor Authentication for dummies

Fri, 27 Oct 2017 24:00:00 EDT

The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more. Published by: iovation, Inc.

6 Key Use Cases for Securing Your Organization’s Cloud Workloads

Thu, 26 Oct 2017 24:00:00 EDT

According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure. Published by: CyberArk Software, Inc

A Privileged Account Security Approach To GDPR Readiness

Wed, 25 Oct 2017 24:00:00 EDT

It is difficult to achieve GDPR compliance without securing the privileged pathways to the systems containing personal data. Key into this white paper to learn more about GDPR and how you can protect personal data within your organization. Published by: CyberArk Software, Inc

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

Wed, 25 Oct 2017 24:00:00 EDT

Gartner estimates that by 2019, cloud security audits will routinely include a model that scores risk and implementation effectiveness separately. Explore this white paper to learn how you can effectively mitigate the risks threatening your enterprise's data in the cloud. Published by: Absolute

How Cloud is Reshaping Digital ECM Strategies

Thu, 19 Oct 2017 24:00:00 EDT

In this expert e-guide, we explore some of the new and evolving trends in cloud-based ECM. Discover how to prioritize the capabilities that matter most to your content management strategy and weigh considerations like on-prem vs. cloud deployments, AI capabilities, advanced collaboration tools, security, and more. Published by: Citrix

Balancing ECM User Experiences with IT Control and Security

Thu, 19 Oct 2017 24:00:00 EDT

In this expert e-guide, we explore how you can deliver quality ECM user experiences without sacrificing IT control or security. Learn how to strike the balance and discover 7 features that help you deliver a better user experience. Published by: Citrix

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information

Fri, 13 Oct 2017 24:00:00 EDT

According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches. Published by: HID Global

A Risk Manager’s Guide to the General Data Protection Regulation (GDPR)

Mon, 23 Oct 2017 24:00:00 EDT

Noncompliance with the GDPR will result in a maximum fine of €20,000,000 or 4% of an organization's worldwide revenue, whichever is greater. In this white paper, gain a deeper understanding of the GDPR, how it will affect your organization, and how you can prepare for it. Published by: BitSight

The 6 Phases of a DDoS Incident Response Plan

Fri, 20 Oct 2017 24:00:00 EDT

Incident response is too often an afterthought in the case of DDoS attacks. So, what does an effective incident response program look like? Inside uncover the 6 phases of a DDoS incident response plan and how to put them into place. Published by: Arbor Networks

The Three Faces Of Insider Threat

Fri, 20 Oct 2017 24:00:00 EDT

According to IBM, 95% of all security incidents involve human error. Are you prepared for the enemy within? In this white paper, uncover how to protect your organization against insider threats. Published by: Absolute

Complying with GDPR: What All Organizations Need to Know

Wed, 18 Oct 2017 24:00:00 EDT

With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more. Published by: Absolute

SAP HANA and IBM Power Systems: Better Together

Mon, 09 Oct 2017 24:00:00 EDT

If you're looking to accelerate your ability to leverage SAP data and generate real-time insights, you may want to consider examining the servers that support your key apps and databases like SAP HANA. Learn about IBM Power Systems and how they measure up when compared to traditional x86-based servers. Published by: EOH IBM

Protecting Data After the Digital Disruption

Wed, 04 Oct 2017 24:00:00 EDT

Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more. Published by: Proofpoint, Inc.

Steps to Protect Your Growing Data

Mon, 02 Oct 2017 24:00:00 EDT

The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging. In this issue of Information Security, security experts examine data protection risks and considerations for implementing a data - centric security model. Published by:

Expert Perspectives on Data Protection and GDPR Compliance

Wed, 20 Sep 2017 24:00:00 EDT

A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance. Published by: CyberArk Software, Inc

SWIFT Security Controls to be Mandatory by 2018

Tue, 19 Sep 2017 24:00:00 EDT

Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018. Published by: CyberArk Software, Inc

SIEM Analysis for Security Professionals

Thu, 14 Sep 2017 24:00:00 EDT

This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise. Published by: LogRhythm, Inc.

Managing Access to Keep Privileged Users' Credentials Secure

Wed, 20 Sep 2017 24:00:00 EDT

Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list. Published by:

How to Think like a Hacker to Stop Application Security Threats

Tue, 19 Sep 2017 24:00:00 EDT

Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize. Published by: IBM

Data Protection Steps for Ransomware

Mon, 03 Apr 2017 24:00:00 EDT

Forrester Research predicts that ransomware attacks and privacy breaches will escalate in 2017. That means organizations without ransomware protection are taking a huge risk. Access our new guide, Two Quick Data Protection Steps for Ransomware, and find out why it's more important than ever to be proactive in the fight against this epidemic. Published by: TechTarget

Focus: Datacentre Uptime

Tue, 12 Sep 2017 24:00:00 EDT

In this e-guide, we take a closer look at some high-profile datacentre outages of recent times and assess the toll they took on the companies involved, and look into what providers and consumers can do to protect themselves from downtime. Published by:

Get Your Company GDPR-Ready: Research Study Results

Wed, 06 Sep 2017 01:01:45 EDT

The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more. Published by: CA Technologies.

GDPR: The State of Play

Mon, 11 Sep 2017 24:00:00 EDT

An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play. Published by:

Ready, Set, Go: General Data Protection Regulation (GDPR)

Wed, 06 Sep 2017 24:00:00 EDT

With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival. Published by: CA Technologies.

What Does The GDPR Mean To You? How To Improve Your Testing And Keep Your Test Data Compliant

Wed, 06 Sep 2017 24:41:35 EDT

Data breaches are almost an everyday event – but the upcoming General Data Protection Regulation (GDPR) forces you to think differently about data breaches and how they impact your software development and testing process. Learn what you can do to avoid compromising your test data, and how CA Test Data Manager can help. Published by: CA Technologies.

CW Europe – September-November 2017

Thu, 07 Sep 2017 24:00:00 EDT

In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years. Published by:

Could the WannaCry Decryptor Work on Other Ransomware Strains?

Tue, 29 Aug 2017 24:00:00 EDT

After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains. Published by: Cisco Umbrella

CW Nordics August 2017

Thu, 24 Aug 2017 24:00:00 EDT

The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more. Published by:

A Computer Weekly Buyer's Guide to Customer Experience

Thu, 10 Aug 2017 24:00:00 EDT

Discover how to craft data-first CRM strategies and get tips about coordinating data sources for effective CRM, 5 ways to reduce risks for Salesforce deployments, and the pros and cons of current CRM software offerings. Published by:

Achieving Security Through Data-Driven Intelligence: Splunk for Defense Overview

Thu, 10 Aug 2017 24:00:00 EDT

In this product guide, learn how Splunk can be used for security purposes, allowing you to achieve security and efficiencies through data-driven intelligence. Published by: Splunk

CW Benelux August 2017

Thu, 10 Aug 2017 24:00:00 EDT

The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today. Published by:

Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR

Tue, 18 Jul 2017 24:00:00 EDT

Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals. Published by:

CW ASEAN – July 2017: Be alert to threats

Thu, 13 Jul 2017 24:00:00 EDT

With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy. Published by:

CW ANZ – July 2017: Cyber security plan bears fruit

Thu, 13 Jul 2017 24:00:00 EDT

Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape. Published by:

What’s New in MySQL 5.7

Wed, 28 Jun 2017 24:00:00 EDT

Oracle's MySQL 5.7 offers a secure, scalable way to manage data. Learn more about the performance and security improvements in this iteration of MySQL in the following white paper. Published by: Oracle Corporation

Top 7 Reasons to Optimize Network Security with a Security Delivery Platform

Mon, 19 Jun 2017 24:00:00 EDT

Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps. Published by: Gigamon

A Computer Weekly Buyer's Guide to EU General Data Protection

Tue, 30 May 2017 24:00:00 EDT

The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare. Published by:

Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems

Tue, 13 Jun 2017 24:00:00 EDT

In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends. Published by:

What the new EU data protection rules mean for IT marketers

Tue, 30 May 2017 24:00:00 EDT

The new EU data protection laws are top of the agenda for IT buyers this year – find out what opportunities this presents for IT marketers. Published by:

Managing Machine Data from POS, IoT, Sensors, and Other Data Sources

Tue, 23 May 2017 24:00:00 EDT

This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Discover how to optimize the value of your machine data from point-of-sales (POS) systems, IoT sensors, smart devices, and more to support analytics and data security. Published by: Splunk

Middleware and Operating System Machine Data

Tue, 23 May 2017 24:00:00 EDT

This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more. Published by: Splunk

Political Turmoil Threatens Global IT Services Sector

Tue, 16 May 2017 24:00:00 EDT

In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now. Published by:

The Investigatory Powers Act 2016 and Internet Connections Records

Tue, 09 May 2017 24:00:00 EDT

This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016. Published by: