Subscribe: Most Popular White Papers and WebcastsRisk Management Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
attacks  data  ddos attacks  ddos  gdpr  guide  protection  published computerweekly  published  security  software  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsRisk Management Research

Most Popular White Papers and Webcasts Risk Management Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Tue, 21 Nov 2017 15:00:14 EST

Last Build Date: Tue, 21 Nov 2017 15:00:14 EST


How Can Privileged Access Accounts Be Managed in Large Companies?

Mon, 13 Nov 2017 24:00:00 EST

According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access. Published by: One Identity

How can organizations get control over privileged identity management?

Tue, 14 Nov 2017 24:00:00 EST

Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information Published by: One Identity

Explore the latest enterprise mobile security technology

Thu, 26 Oct 2017 24:00:00 EDT

As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats. Published by: SearchMobileComputing

A Privileged Account Security Approach To GDPR Readiness

Wed, 25 Oct 2017 24:00:00 EDT

It is difficult to achieve GDPR compliance without securing the privileged pathways to the systems containing personal data. Key into this white paper to learn more about GDPR and how you can protect personal data within your organization. Published by: CyberArk Software, Inc

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

Wed, 25 Oct 2017 24:00:00 EDT

Gartner estimates that by 2019, cloud security audits will routinely include a model that scores risk and implementation effectiveness separately. Explore this white paper to learn how you can effectively mitigate the risks threatening your enterprise's data in the cloud. Published by: Absolute

Absolute Persistence

Wed, 25 Oct 2017 24:00:00 EDT

Technology never waits, and in the past 20 years we've seen plenty of change. Gone are the days when IT could support the business with one make of PC and a phone. Explore this white paper to discover how to secure and manage endpoints so your organization is protected, business data is secured, and end user productivity is supported. Published by: Absolute

What is the Best Type of DDoS Protection for my Business?

Wed, 25 Oct 2017 24:00:00 EDT

Cisco predicts that by 2020, 17 million DDoS attacks will occur annually. In this white paper, learn which type of DDoS protection is best for your business. Published by: Arbor Networks

5 questions to ask when considering a DDoS Managed Service

Tue, 24 Oct 2017 24:00:00 EDT

When evaluating DDoS protection for your business, what are the top questions you should ask? This white paper offers 5 questions to ask to ensure you are picking the best DDoS protection strategy for your enterprise. Published by: Arbor Networks

Advantages of a Fabric vs. Platform Approach to Enterprise Security

Tue, 24 Oct 2017 24:00:00 EDT

It is challenging to know which strategy is best for your enterprise protection. This white paper explores the differences between a fabric and a platform approach to your security framework, and reveals how you can protect your enterprise from security threats. Published by: Fortinet, Inc.

A Risk Manager’s Guide to the General Data Protection Regulation (GDPR)

Mon, 23 Oct 2017 24:00:00 EDT

Noncompliance with the GDPR will result in a maximum fine of €20,000,000 or 4% of an organization's worldwide revenue, whichever is greater. In this white paper, gain a deeper understanding of the GDPR, how it will affect your organization, and how you can prepare for it. Published by: BitSight

The APAC Guide to Data Protection & GDPR

Mon, 23 Oct 2017 24:00:00 EDT

In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region. Published by:

The State of Endpoint Protection & Management

Fri, 20 Oct 2017 24:00:00 EDT

According to Larry Ponemon of the Ponemon Institute, 67% of enterprises are unable to detect employee use of insecure mobile devices. This white paper aims to answer some of the top questions security and IT operations executives face in regard to endpoint security, mobile security, and overall protection of your enterprise. Published by: Absolute

The 6 Phases of a DDoS Incident Response Plan

Fri, 20 Oct 2017 24:00:00 EDT

Incident response is too often an afterthought in the case of DDoS attacks. So, what does an effective incident response program look like? Inside uncover the 6 phases of a DDoS incident response plan and how to put them into place. Published by: Arbor Networks

The Three Faces Of Insider Threat

Fri, 20 Oct 2017 24:00:00 EDT

According to IBM, 95% of all security incidents involve human error. Are you prepared for the enemy within? In this white paper, uncover how to protect your organization against insider threats. Published by: Absolute

Economics of DDoS Attacks

Thu, 19 Oct 2017 24:00:00 EDT

DDoS attacks are cheaper than ever for the perpetrator, extremely lucrative for the attack service provider, and financially devastating for the target. Read this white paper to gain insight into DDoS attacks as a service to prevent your company from having to pay the steep downtime costs and potential legal fees. Published by: Arbor Networks

Complying with GDPR: What All Organizations Need to Know

Wed, 18 Oct 2017 24:00:00 EDT

With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more. Published by: Absolute

The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business

Wed, 18 Oct 2017 24:00:00 EDT

According to the Worldwide Infrastructure Security Report, 93% of survey respondents experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. Inside, learn how DDoS attacks have evolved and changed over time. Published by: Arbor Networks

Top 5 Security Challenges Brought on by Mobile and Cloud

Wed, 27 Sep 2017 24:00:00 EDT

50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing. Published by: Entrust, Inc.

Expert Perspectives on Data Protection and GDPR Compliance

Wed, 20 Sep 2017 24:00:00 EDT

A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance. Published by: CyberArk Software, Inc

SWIFT Security Controls to be Mandatory by 2018

Tue, 19 Sep 2017 24:00:00 EDT

Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018. Published by: CyberArk Software, Inc

Privileged Account Security

Tue, 19 Sep 2017 24:00:00 EDT

55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts. Published by: CyberArk Software, Inc

How Ransomware Attacks have Changed

Wed, 20 Sep 2017 24:00:00 EDT

Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks. Published by: CyberArk Software, Inc

Logrythm's Security Analytics Platform: Product Overview

Thu, 14 Sep 2017 24:00:00 EDT

In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment. Published by: LogRhythm, Inc.

SIEM Analysis for Security Professionals

Thu, 14 Sep 2017 24:00:00 EDT

This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise. Published by: LogRhythm, Inc.

Why Security in DevOps is Essential to Software Development

Tue, 19 Sep 2017 24:00:00 EDT

What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so. Published by:

Insuring the uninsurable: Is cyber insurance worth its salt?

Tue, 12 Sep 2017 24:00:00 EDT

This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions. Published by:

GDPR: The State of Play

Mon, 11 Sep 2017 24:00:00 EDT

An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play. Published by:

Beyond your company boundaries

Wed, 12 Jul 2017 24:00:00 EDT

Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly. Published by:

How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

Fri, 09 Jun 2017 24:00:00 EDT

In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more. Published by: Rapid7

Focus: how to avoid being hit by ransomware

Thu, 18 May 2017 24:00:00 EDT

In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software. Published by:

Focus ASEAN: Security & Digital Transformation

Tue, 11 Apr 2017 24:00:00 EDT

With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally. Published by:

Reduce the Risks and Costs Associated with Software Assets and Licensing

Wed, 26 Aug 2015 24:00:00 EDT

Organizations around the world spend over an estimated $330 billion on enterprise software every year. Software asset management (SAM) is designed to help you keep track of all your software licensing data, ensure compliance, and prevent overspending. Watch this 2 minute video to see how SAM will save your bottom line. Published by: Snow Software

Object Storage 101

Tue, 07 Feb 2017 24:00:00 EST

Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin. Published by:

Are we trusting social networks too much?

Tue, 31 Jan 2017 24:00:00 EST

This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks Published by:

Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology

Mon, 23 Jan 2017 24:00:00 EST

In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now. Published by:

The Benefits of Bug Bounty Programs and Security Code Testing

Fri, 13 Jan 2017 24:00:00 EST

In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats. Published by: Veracode, Inc.

Global Risks Report 2017

Fri, 13 Jan 2017 24:00:00 EST

Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals Published by:

Focus: Securing for the future

Tue, 10 Jan 2017 24:00:00 EST

2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts. Published by:

Computer Weekly: Data Danger

Wed, 14 Dec 2016 24:00:00 EST

In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world? Published by:

5 Ways to Prevent a Ransomware Infection through Network Security

Mon, 12 Dec 2016 24:00:00 EST

What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security. Published by: Fortinet, Inc.

Firewall Clean Up Recommendations

Wed, 30 Nov 2016 24:00:00 EST

At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes. Published by: FireMon

The Current State of Data Protection in Midsize Organizations

Wed, 30 Nov 2016 24:00:00 EST

Discover why and how IT security strategies are evolving from the survey results of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations. Published by: arcserve

Threat management: Essential guide

Fri, 25 Nov 2016 24:00:00 EST

Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management. Published by:

Powerful DDoS Attacks & Recovery for Enterprises

Tue, 24 Oct 2017 24:00:00 EDT

A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn. Published by: Arbor Networks

Encryption Hiding Malware in Half of Cyber Attacks

Fri, 22 Sep 2017 24:00:00 EDT

A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks. Published by: A10 Networks

Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises

Fri, 22 Sep 2017 24:00:00 EDT

Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk. Published by: A10 Networks

Step Up Your Security and Privacy with Data Masking

Mon, 28 Aug 2017 24:48:04 EDT

For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more. Published by: Delphix

EU GDPR Compliance Puts Focus on Data Tracking, Encryption

Thu, 31 Aug 2017 24:00:00 EDT

In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance. Published by: Ivanti

Cyber security solutions from IBM

Fri, 20 Jul 2012 24:00:00 EDT

Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection. Published by: IBM

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network

Mon, 02 Aug 2010 24:00:00 EDT

This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact. Published by: nCircle