Subscribe: Most Popular White Papers and WebcastsInformation Security Research
http://www.bitpipe.com/rss/Information-Security.xml
Preview: Most Popular White Papers and WebcastsInformation Security Research

Most Popular White Papers and Webcasts Information Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Thu, 09 Nov 2017 14:45:13 EST

Last Build Date: Thu, 09 Nov 2017 14:45:13 EST

 



The Top Cyber Security Trends in ANZ in 2017

Wed, 19 Jul 2017 24:00:00 EDT

In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand. Published by: ComputerWeekly.com



MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate

Fri, 30 Jun 2017 24:00:00 EDT

An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know. Published by: MicroScope



MicroScope E-Zine: January 2017

Wed, 04 Jan 2017 24:00:00 EST

Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017. Published by: MicroScope



Get Smart About Threat Intel Tools and Services

Mon, 20 Feb 2017 24:00:00 EST

Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme. Published by: SearchSecurity.com



Secure Information Exchange in the Digital Age

Tue, 31 Jan 2017 24:00:00 EST

Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age. Published by: OpenText



Crafting an Insider Threat Program: Why and How

Fri, 20 Jan 2017 24:00:00 EST

Tackling IT threats is even harder when the breach -- malicious or inadvertent -- originates in the company. Learn how to handle insider threats. Published by: SearchSecurity.com



Judging MSSP Options With Care

Wed, 21 Dec 2016 24:00:00 EST

The managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider. Published by: SearchSecurity.com