Subscribe: Most Popular White Papers and WebcastsRisk Management Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
access  attacks  data  expert  gdpr  guide  learn  privileged access  privileged  published computerweekly  published  security  software  threats 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsRisk Management Research

Most Popular White Papers and Webcasts Risk Management Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Fri, 23 Feb 2018 13:30:15 EST

Last Build Date: Fri, 23 Feb 2018 13:30:15 EST


Making GRC Understandable, Actionable, and Auditable for New Regulations

Wed, 21 Feb 2018 24:00:00 EST

TBD Published by: ServiceNow

The Future of Privileged Management

Wed, 14 Feb 2018 24:00:00 EST

The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts. Published by: One Identity

Regulating Privileged Access: When to Require Human Approval Workflows

Wed, 14 Feb 2018 24:00:00 EST

Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity. Published by: One Identity

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

Wed, 14 Feb 2018 24:00:00 EST

In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights. Published by: One Identity

Identity Analytics – A more Collective Defense

Wed, 14 Feb 2018 24:00:00 EST

As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task. Published by: One Identity

Employee & Device Monitoring: Dispelling the Myths

Mon, 12 Feb 2018 01:00:59 EST

Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program. Published by: Forcepoint

User Behavior Analysis & SIEM

Wed, 07 Feb 2018 24:00:00 EST

In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis. Published by: LogRhythm, Inc.

IoT: Take Control of the Edge

Mon, 05 Feb 2018 24:00:00 EST

With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud. Published by: VMware

Five Milestones to GDPR Success

Tue, 06 Feb 2018 24:00:00 EST

The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant. Published by: Proofpoint, Inc.

Endpoint Protection & Device Management

Wed, 24 Jan 2018 24:00:00 EST

The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices. Published by: Seqrite

Computer Weekly – 30 January 2018: Davos debates global tech risks

Thu, 25 Jan 2018 24:00:00 EST

In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now. Published by:

Why Websites Stay Vulnerable: And What You Can Do About It

Wed, 24 Jan 2018 24:00:00 EST

Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security. Published by: WhiteHat Security

2017 Application Security Statistics Report

Tue, 16 Jan 2018 24:00:00 EST

According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report. Published by: WhiteHat Security

Getting the Most out of your AppSec Program

Tue, 23 Jan 2018 24:00:00 EST

According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program. Published by: WhiteHat Security

Enabling Healthcare with Trusted Access

Thu, 18 Jan 2018 24:00:00 EST

Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry. Published by: Duo Security

Case Study: Quadruple Backup Speed and Blocks Ransomware Attacks with Backup Platform

Tue, 24 Oct 2017 24:00:00 EDT

This case study explores how Johnson Electric, one of the world's largest electrical providers, protected their organization against ransomware targeting their large amount of data. Published by: Acronis

The APAC Guide to Data Protection & GDPR

Mon, 23 Oct 2017 24:00:00 EDT

In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region. Published by:

Insuring the uninsurable: Is cyber insurance worth its salt?

Tue, 12 Sep 2017 24:00:00 EDT

This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions. Published by:

GDPR: The State of Play

Mon, 11 Sep 2017 24:00:00 EDT

An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play. Published by:

Beyond your company boundaries

Wed, 12 Jul 2017 24:00:00 EDT

Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly. Published by:

How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

Fri, 09 Jun 2017 24:00:00 EDT

In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more. Published by: Rapid7

Focus: how to avoid being hit by ransomware

Thu, 18 May 2017 24:00:00 EDT

In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software. Published by:

Focus ASEAN: Security & Digital Transformation

Tue, 11 Apr 2017 24:00:00 EDT

With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally. Published by:

An Introduction to the Security Advantages of Mirco-Segmentation

Wed, 30 Nov 2016 24:00:00 EST

Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security. Published by: VMware

The Security of Software Containers & Sandboxing

Mon, 22 Jan 2018 24:00:00 EST

Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two. Published by: CloudPassage

How to update, automate your IR processes

Thu, 04 Jan 2018 24:00:00 EST

In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes. Published by: Booz Allen Hamilton

How Can Privileged Access Accounts Be Managed in Large Companies?

Mon, 13 Nov 2017 24:00:00 EST

According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access. Published by: One Identity

How can organizations get control over privileged identity management?

Tue, 14 Nov 2017 24:00:00 EST

Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information Published by: One Identity

Powerful DDoS Attacks & Recovery for Enterprises

Tue, 24 Oct 2017 24:00:00 EDT

A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn. Published by: Arbor Networks

Explore the latest enterprise mobile security technology

Thu, 26 Oct 2017 24:00:00 EDT

As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats. Published by: SearchMobileComputing

Complying with GDPR: What All Organizations Need to Know

Wed, 18 Oct 2017 24:00:00 EDT

With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more. Published by: Absolute

Encryption Hiding Malware in Half of Cyber Attacks

Fri, 22 Sep 2017 24:00:00 EDT

A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks. Published by: A10 Networks

Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises

Fri, 22 Sep 2017 24:00:00 EDT

Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk. Published by: A10 Networks

Expert Perspectives on Data Protection and GDPR Compliance

Wed, 20 Sep 2017 24:00:00 EDT

A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance. Published by: CyberArk Software, Inc

SWIFT Security Controls to be Mandatory by 2018

Tue, 19 Sep 2017 24:00:00 EDT

Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018. Published by: CyberArk Software, Inc

Privileged Account Security

Tue, 19 Sep 2017 24:00:00 EDT

55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts. Published by: CyberArk Software, Inc

How Ransomware Attacks have Changed

Wed, 20 Sep 2017 24:00:00 EDT

Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks. Published by: CyberArk Software, Inc

Logrythm's Security Analytics Platform: Product Overview

Thu, 14 Sep 2017 24:00:00 EDT

In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment. Published by: LogRhythm, Inc.

SIEM Analysis for Security Professionals

Thu, 14 Sep 2017 24:00:00 EDT

This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise. Published by: LogRhythm, Inc.

Why Security in DevOps is Essential to Software Development

Tue, 19 Sep 2017 24:00:00 EDT

What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so. Published by:

Step Up Your Security and Privacy with Data Masking

Mon, 28 Aug 2017 24:48:04 EDT

For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more. Published by: Delphix

EU GDPR Compliance Puts Focus on Data Tracking, Encryption

Thu, 31 Aug 2017 24:00:00 EDT

In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance. Published by: Ivanti

Cyber security solutions from IBM

Fri, 20 Jul 2012 24:00:00 EDT

Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection. Published by: IBM

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network

Mon, 02 Aug 2010 24:00:00 EDT

This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact. Published by: nCircle

6 Ways to Keep Your Endpoint Devices Secure

Wed, 26 Jul 2017 24:00:00 EDT

Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool. Published by: Sentinel Labs, Inc.

Managed Detection and Response

Fri, 30 Dec 2016 24:00:00 EST

Being resilient to a threat from an advanced adversary is dependent on your organization's integrated capabilities to quickly detect them and respond. In this white paper, learn how you can employ and tune the security tools at your organization to combat today's threats. Published by: Dell SecureWorks