Subscribe: Most Popular White Papers and WebcastsSecurity Threats Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
computerweekly  cyber security  cyber  data  guide  learn  published computerweekly  published splunk  published  security  threat 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Threats Research

Most Popular White Papers and Webcasts Security Threats Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Wed, 21 Feb 2018 11:30:15 EST

Last Build Date: Wed, 21 Feb 2018 11:30:15 EST


CW Nordics ezine February 2018

Thu, 22 Feb 2018 24:00:00 EST

In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs. Published by:

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

Wed, 14 Feb 2018 24:00:00 EST

In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights. Published by: One Identity

Employee & Device Monitoring: Dispelling the Myths

Mon, 12 Feb 2018 01:00:59 EST

Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program. Published by: Forcepoint

Detect Unknown Threats, Reduce Dwell Time, And Accelerate Response

Thu, 30 Nov 2017 24:00:00 EST

Click inside to learn about an endpoint detection and response tool that can help you detect complex attacks. This system offers continual monitoring and analysis of user behavior in your endpoints, and more. Published by: Dell and Intel

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code

Tue, 16 Jan 2018 24:00:00 EST

Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster. Published by: WhiteHat Security

Secure Coding Practices: Avoid OS Command Injection Attacks

Tue, 16 Jan 2018 24:53:21 EST

Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks. Published by: WhiteHat Security

Updates: The next evolution of operating systems

Tue, 16 Jan 2018 24:00:00 EST

In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system. Published by:

CIO Trends #6: Nordics

Fri, 15 Dec 2017 24:00:00 EST

In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders. Published by:

CW Europe – December 2017

Thu, 14 Dec 2017 24:00:00 EST

In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid. Published by:

Web security: Important but often overlooked

Fri, 24 Nov 2017 24:00:00 EST

In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls. Published by:

Why Network Monitoring is Important for Cybersecurity Readiness

Wed, 25 Oct 2017 24:00:00 EDT

Our experts explain how consolidating traffic through known secure gateways and watching traffic closely with a variety of monitoring tools can improve cybersecurity readiness. Published by: LiveAction

Healthtech And Security: Sharing And Safeguarding Patient Data

Fri, 31 Mar 2017 24:00:00 EDT

Learn more about how to prevent cybercriminals from accessing your patient's electronic medical records in Aberdeen Group's HealthTech study. Published by: Absolute

Security Analytics

Mon, 09 Oct 2017 24:00:00 EDT

This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices. Published by:

Turning the Tide Against Ransomware

Thu, 05 Oct 2017 24:00:00 EDT

WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out. Published by: Proofpoint, Inc.

Protecting Data After the Digital Disruption

Wed, 04 Oct 2017 24:00:00 EDT

Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more. Published by: Proofpoint, Inc.

Insuring the uninsurable: Is cyber insurance worth its salt?

Tue, 12 Sep 2017 24:00:00 EDT

This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions. Published by:

Could the WannaCry Decryptor Work on Other Ransomware Strains?

Tue, 29 Aug 2017 24:00:00 EDT

After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains. Published by: Cisco Umbrella

How to Bolster Endpoint Security Protection

Fri, 11 Aug 2017 24:00:00 EDT

This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more. Published by: Symantec

SME cyber security is increasingly a business imperative

Mon, 07 Aug 2017 24:00:00 EDT

A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business. Published by:

Cyber security in the Nordics

Mon, 31 Jul 2017 24:00:00 EDT

With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent. Published by:

The Top Cyber Security Trends in ANZ in 2017

Wed, 19 Jul 2017 24:00:00 EDT

In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand. Published by:

Computer Weekly – 18 July 2017: Airbus secures critical infrastructure

Mon, 17 Jul 2017 24:00:00 EDT

This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient. Published by:

The Top Cyber Security Trends in ASEAN in 2017

Mon, 17 Jul 2017 24:00:00 EDT

For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks. Published by:

European Perceptions, Preparedness and Strategies for IoT Security

Wed, 12 Jul 2017 24:00:00 EDT

Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices. Published by:

Print security: An imperative in the IoT era

Mon, 10 Jul 2017 24:00:00 EDT

Analyst group Quocirca gives the perspective on the risks and best practices of print security. Published by:

10 Reasons Your Cyber Security Strategy Needs A Checkup

Tue, 27 Jun 2017 24:00:00 EDT

Click into this infographic to learn the 10 reasons your security might need a checkup. Published by: Rackspace

Your expert guide to the highlights of Infosecurity Europe 2017

Mon, 19 Jun 2017 24:00:00 EDT

Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London. Published by:

Six Criteria for Buying Data Loss Prevention Products

Wed, 07 Jun 2017 24:00:00 EDT

Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses. Published by: InteliSecure

Introduction to Data Loss Prevention Tools

Wed, 07 Jun 2017 24:00:00 EDT

In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more. Published by: InteliSecure

How the Basics of Network Security Have Evolved

Mon, 05 Jun 2017 24:00:00 EDT

In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months. Published by: Fortinet, Inc.

Building a More Effective Vulnerability Scanning Program

Fri, 09 Jun 2017 24:00:00 EDT

This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior. Published by: Rapid7

How IoT is Changing The Security Landscape

Thu, 01 Jun 2017 24:00:00 EDT

In this expert-guide, learn more about the possible dangers of IoT, as well as some ideas on how you can redesign your security network to better combat hackers that would take advantage of this young technology. Published by: Fortinet, Inc.

The Security Risks of IoT

Wed, 31 May 2017 24:00:00 EDT

In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose. Published by: Fortinet, Inc.

Top 10 Business Logic Attack Vectors Attacking and Exploiting Business Application Assets and Flaws – Vulnerability Detection to Fix

Wed, 07 Jun 2017 24:00:00 EDT

In this white paper, gain an overview of the top 10 business logic flaw attacks, as well as some tips on how you can test and eliminate these kinds of vulnerabilities. Published by: Rapid7

Active defence through deceptive IPS

Mon, 05 Jun 2017 24:00:00 EDT

This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks Published by:

Your IIoT Security Plan: Risks in Manufacturing

Fri, 26 May 2017 24:00:00 EDT

In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory. Published by: Bayshore Networks

7 Steps to Overcome SSL Security Issues and Vulnerabilities

Thu, 25 May 2017 24:00:00 EDT

As SSL technology evolves and changes, new vulnerabilities begin to cause problems. Inside this guide, industry expert Rob Shapland explains how security professionals can overcome these SSL security issues with 7 key steps. Published by: Fortinet, Inc.

Splunk Everywhere! Ransomware

Tue, 23 May 2017 24:01:27 EDT

Learn how you can compete with the rising threat of ransomware in this webcast, by using a real-time analytics-based program which allows your security to be adaptive and respond to ransomware attacks at machine speed. Published by: Splunk

Operationalizing Threat Intelligence for Enterprise Security

Fri, 19 May 2017 24:00:00 EDT

In this white paper, learn about a system designed to help you manage, categorize, and investigate security anomalies based on data that has been automatically collected and aggregated from multiple sources. Published by: Splunk

The 6 Essential Capabilities of an Analytics-Driven SIEM

Fri, 19 May 2017 24:00:00 EDT

Collecting and analyzing security data is no longer enough, today's business needs to be able to use a security event management (SIEM) platform to derive actionable intelligence from this information. Read this white paper to learn the 6 capabilities every SIEM needs to succeed. Published by: Splunk

Unified Communication: “It should work as easily as a telephone call!”

Mon, 15 May 2017 24:00:00 EDT

This article in our Royal Holloway Information Security series explains the security implications of unified communication. Published by:

The Investigatory Powers Act 2016 and Internet Connections Records

Tue, 09 May 2017 24:00:00 EDT

This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016. Published by:

How Fortinet Security Fabric Addresses Today's Top Security Concerns

Fri, 03 Mar 2017 24:00:00 EST

In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more. Published by: Fortinet, Inc.


Thu, 04 May 2017 24:00:00 EDT

Learn a new approach to SIEM that will give your organization the ability to combat the modern threat landscape and secure its data, all from a single pane of glass. Published by: Splunk

Security Use Case Detecting Unknown Malware

Wed, 03 May 2017 24:00:00 EDT

Learn how to gain significant power over understanding detailed activities on endpoint as well as the ability to detect advanced and unknown malware activities. Published by: Splunk

A Security Leaders Definitive Guide to the Threat Landscape

Mon, 30 Jan 2017 24:00:00 EST

This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it. Published by: Fortinet, Inc.

6 Ways to Use Threat Intelligence Data

Sat, 31 Dec 2016 24:00:00 EST

Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more. Published by: Splunk


Mon, 01 May 2017 24:00:00 EDT

In this eBook, you'll learn how to balance the growing mobility needs of end users and the needs of IT. And, learn how to everything in your mobile ecosystem is interconnected and how to manage performance, security, flexibility connectivity and durability. Published by: Lenovo

Build Strong Security, Starting From The Device-Level

Mon, 01 May 2017 24:00:00 EDT

In this eGuide, take a look at physical security threats to which every computer—whether desktop PC, laptop or tablet— is vulnerable, and discover how to guard against them. Published by: Lenovo

Data Breach: Security Investigation, Detection and Rapid Response

Mon, 01 May 2017 24:00:00 EDT

Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action. Published by: Splunk