Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cloud  computerweekly  cyber security  cyber  data  discover  gdpr  guide  learn  published computerweekly  published  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 18 Aug 2017 16:35:18 EDT

Last Build Date: Fri, 18 Aug 2017 16:35:18 EDT

 



How to Bolster Endpoint Security Protection

Fri, 11 Aug 2017 24:00:00 EDT

This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more. Published by: Symantec & Blue Coat Systems



Are Small Firms Ready for the GDPR?

Thu, 10 Aug 2017 24:00:00 EDT

A NetApp survey finds that smaller firms are not ready for the arrival of GDPR. This e-guide reveals the details of this survey and explores what these results mean for channel data specialists. Published by: Avnet



Why You Shouldn't Wait to Build a Data Governance Model

Mon, 14 Aug 2017 24:00:00 EDT

As your company amasses data from multiple sources, you can potentially lose control over data quality and accuracy. In this expert e-guide, learn why it's time to halt the data free-for-all and apply data governance to keep your organization on track. Published by: ERwin



Exploring Five GDPR Compliance Myths

Thu, 10 Aug 2017 24:00:00 EDT

The General Data Protection Regulation (GDPR) comes into force in May 2018, and there are a few misconceptions surrounding this legislation. This e-guide explores 5 common myths surrounding GDPR to help you prepare for the deadline. Published by: Avnet



Computer Weekly – 15 August 2017: Tech takes the lead in the Tour de France

Fri, 11 Aug 2017 24:00:00 EDT

When watching sports on television you are consistently confronted with a barrage of data, giving insight into the most complicated inner workings of football, tennis, cricket, etc., but never in cycling. Access this week's ComputerWeekly to learn how IoT is being introduced to the Tour de France and what that means for the viewer. Published by: ComputerWeekly.com



Achieving Security Through Data-Driven Intelligence: Splunk for Defense Overview

Thu, 10 Aug 2017 24:00:00 EDT

In this product guide, learn how Splunk can be used for security purposes, allowing you to achieve security and efficiencies through data-driven intelligence. Published by: Splunk



SME cyber security is increasingly a business imperative

Mon, 07 Aug 2017 24:00:00 EDT

A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business. Published by: ComputerWeekly.com



CW Benelux August 2017

Thu, 10 Aug 2017 24:00:00 EDT

The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today. Published by: ComputerWeekly.com



4 Tech Disruptors that Could Radically Change Security Operations

Tue, 01 Aug 2017 24:00:00 EDT

Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future. Published by: SearchSecurity.com



Spot Cloud Security Strategy Flaws Before It's Too Late

Mon, 24 Jul 2017 24:00:00 EDT

From compliance to encryption, there are many boxes an organization needs check to ensure its public cloud is secure. Use this flow chart to kick start that critical process. Published by: HyTrust



Overcome Cloud Security Challenges with These Five Expert Tips

Mon, 24 Jul 2017 24:00:00 EDT

The cloud doesn't have to be less secure than traditional systems. Uncover 5 cloud security tips to ensure your data is safe on the cloud. Published by: HyTrust



Cyber security in the Nordics

Mon, 31 Jul 2017 24:00:00 EDT

With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent. Published by: ComputerWeekly.com



Prepare Your Business For The General Data Protection Regulation (GDPR)

Fri, 28 Jul 2017 24:00:00 EDT

Issues relating to data privacy continue to hit the headlines on a regularbasis. The European Union have introduced the General DataProtection Regulation (GDPR), which is designed to replace the currentData Protection Directive (DPD). Learn about key considerations you'll need to consider when preparing for the GDPR. Published by: Lepide Software



3 Ways to Help Stop Data Leakage in Your Organization

Fri, 28 Jul 2017 24:00:00 EDT

It seems that almost every month there's another high-profile security breach in which sensitive data is leaked. In almost every case, the end result of these data leaks is damage to the reputation and/or bottom line of the company's involved. In this guide, learn 3 ways you can help prevent data leaks within your organization. Published by: Lepide Software



Ransomware and Cloud Security: Keys to Stop the Threat

Mon, 24 Jul 2017 24:00:00 EDT

Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats. Published by: Cisco Umbrella



Securing DNS: What to Do, and What to be Aware of

Mon, 24 Jul 2017 24:00:00 EDT

In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities. Published by: Cisco Umbrella



Compliance in Full Throttle in 2017

Fri, 21 Jul 2017 24:00:00 EDT

According to the TechTarget IT Priorities 2017 survey, nearly two-thirds of respondents reported that their organizations plan to implement compliance initiatives this year. Inside this e-guide uncover why compliance is in full throttle in 2017 and the benefits of compliance and information governance process alignment. Published by: Rsam



How LepideAuditor Helps You Detect and Prevent Privilege Abuse

Thu, 27 Jul 2017 24:00:00 EDT

Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more. Published by: Lepide Software



How LepideAuditor Helps You Detect and Prevent Ransomware Spread

Thu, 27 Jul 2017 24:00:00 EDT

Learn about the important role of security audits in defending against increasingly complex ransomware attacks. Discover how to get real-time insights into changes in the configuration of systems like Active Directory, Exchange Server, and NetApp Filers. Published by: Lepide Software



How to Track Privileged Users' Activities in the Active Directory

Wed, 26 Jul 2017 24:00:00 EDT

Privileged account abuse can result in data breaches, downtime, and failed compliance audits. Discover a 4 step process for tracking the activities of privileged user accounts to bolster your security posture and uncover an even easier way to audit privileged accounts and manage users' activities. Published by: Lepide Software



How LepideAuditor Helps You Detect and Prevent Insider Threats

Wed, 26 Jul 2017 24:00:00 EDT

Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more. Published by: Lepide Software



A Look at the Shared Responsibility Model for Cloud Providers

Thu, 20 Jul 2017 24:00:00 EDT

Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots. Published by: SolarWinds, Inc.



What's New in the World of Managed Security Providers?

Thu, 20 Jul 2017 24:00:00 EDT

Go inside this expert guide to explore the 2 major ways managed security service providers have changed in recent years. Published by: SolarWinds, Inc.



Podcast: Post-Password Security: AI, Risk-Based and Context

Fri, 30 Jun 2017 24:15:02 EDT

Weak and stolen passwords lead to data beaches, but how do you get rid of them? In this podcast, join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password. Published by: Crossmatch



Composite Authentication: The Evolution Beyond 2FA/MFA

Fri, 30 Jun 2017 24:21:25 EDT

In this podcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security. Published by: Crossmatch



Security Analysis Principles and Techniques for IT Pros

Tue, 25 Jul 2017 24:00:00 EDT

As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool. Published by: SearchSecurity.com



Will MSPs Answer the Call for Cybersecurity Services?

Thu, 20 Jul 2017 24:00:00 EDT

Many customers today are looking for security offerings from their service providers, but is this the right direction to take your business? Read this guide to learn what concerns providers must be able to address, and how you could begin to integrate security services into your enterprise. Published by: SolarWinds, Inc.



Oracle MySQL Cloud Service: Propel Innovation and Time-to-Market

Sat, 31 Dec 2016 24:00:00 EST

Find out how to use Oracle MySQL Cloud Service to pioneer innovative apps rapidly with a database service that's secure, cost-effective, automated, integrated, and enterprise-ready. Published by: Oracle Corporation



Excessive Permissions: Mitigate Risk on Shared Folders

Tue, 25 Jul 2017 24:00:00 EDT

Insider threats have a hard time harming your organization if they do not have access to sensitive data. Learn how to detect if a user has excessive permissions on shared folders and mitigate the risk of insider threats. Published by: Lepide Software



Passwords Are Out: But What's Replacing Them?

Fri, 30 Jun 2017 24:00:00 EDT

Join experts Keven Beaver and Jeff Carpenter in this podcast as they discuss why passwords are obsolete and what the "human-proofed" future of IAM and authentication will look like. Published by: Crossmatch



Getting Started with Cloud IAM Services

Wed, 19 Jul 2017 24:00:00 EDT

In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation. Published by: OneLogin



Post-Password Security: AI, Risk-Based and Context

Thu, 29 Jun 2017 24:00:00 EDT

Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password. Published by: Crossmatch



Passwords are Out: But What's Replacing Them?

Thu, 29 Jun 2017 24:00:00 EDT

Join experts Keven Beaver and Jeff Carpenter in this webcast as they discuss why passwords are obsolete and what the "human-proofed" future of authentication will look like. Published by: Crossmatch



Ransomware: 4 Ways to Protect Data Now

Fri, 21 Jul 2017 24:00:00 EDT

Ransomware is a very real threat, seemingly in the news everyday with attacks like WannaCry. Uncover 4 steps to reduce exposure to ransomware attacks, and to minimize its impact in the event of an attack. Published by: Citrix



Achieve GDPR Readiness with Secure App and Data Delivery

Fri, 21 Jul 2017 24:00:00 EDT

GDPR is coming fast, and non-compliance can cripple businesses with heavy fines expected. Ensure your company isn't among those failing to comply. Discover how to achieve GDPR readiness and compliance by enabling IT to create a software-defined perimeter. Published by: Citrix



Composite Authentication: Security Beyond Passwords

Thu, 29 Jun 2017 24:00:00 EDT

In this webcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security. Published by: Crossmatch



5 Things to Keep in Mind when Choosing Single Sign-On

Thu, 20 Jul 2017 24:00:00 EDT

Many traditional single sign-on (SSO) or identity as a service (IDaaS) vendors do not have ways to provide access to network resources. Discover 5 things you should prioritize in your SSO implementation. Published by: Citrix



Is your IT Security Affecting your Workforce Productivity?

Wed, 05 Apr 2017 24:00:00 EDT

In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more. Published by: Dell and Microsoft



Workspaces of the Future

Wed, 31 Aug 2016 24:00:00 EDT

Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments. Published by: Citrix



The Top Cyber Security Trends in ANZ in 2017

Wed, 19 Jul 2017 24:00:00 EDT

In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand. Published by: ComputerWeekly.com



Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR

Tue, 18 Jul 2017 24:00:00 EDT

Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals. Published by: ComputerWeekly.com



Is the Endpoint Security Nightmare Ending?

Mon, 17 Jul 2017 24:00:00 EDT

In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more. Published by: SearchSecurity.com



Is your IT Security Affecting your Workforce Productivity?

Fri, 30 Sep 2016 24:00:00 EDT

65% of devices lack data protection capabilities according to this Forrester Research infographic. Is your IT security affecting your workforce productivity? Published by: Dell and Microsoft



Focus: Disaster recovery planning and virtualisation

Mon, 17 Jul 2017 24:00:00 EDT

We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution. Published by: ComputerWeekly.com



Computer Weekly – 18 July 2017: Airbus secures critical infrastructure

Mon, 17 Jul 2017 24:00:00 EDT

This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient. Published by: ComputerWeekly.com



The Top Cyber Security Trends in ASEAN in 2017

Mon, 17 Jul 2017 24:00:00 EDT

For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks. Published by: ComputerWeekly.com



Mobile Apps Risk: Protect without Hindering Productivity

Mon, 10 Jul 2017 24:00:00 EDT

Mobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps. Published by: Blue Cedar



Mobile Security Risk Mitigation and Tips for Success

Tue, 11 Jul 2017 24:00:00 EDT

Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems. Published by: Blue Cedar



5 Post-Hot Patch App Ban Risks and the Value of Security Assessments

Tue, 11 Jul 2017 24:00:00 EDT

Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches. Published by: Blue Cedar



CW ASEAN – July 2017: Be alert to threats

Thu, 13 Jul 2017 24:00:00 EDT

With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy. Published by: ComputerWeekly.com