Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cloud  computer weekly  computer  computerweekly  cyber  data  guide  new  published computerweekly  published  security  weekly 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Wed, 17 Jan 2018 16:05:14 EST

Last Build Date: Wed, 17 Jan 2018 16:05:14 EST

 



Updates: The next evolution of operating systems

Tue, 16 Jan 2018 24:00:00 EST

In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system. Published by: ComputerWeekly.com



World Economic Forum Global Risks Report 2018

Wed, 17 Jan 2018 24:00:00 EST

The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda. Published by: ComputerWeekly.com



Botnet attacks are evolving; your defenses must too

Mon, 15 Jan 2018 24:00:00 EST

Botnet attacks will expand and evolve. The best way to fight back is to stop searching for the perfect botnet-protection tool and layer defenses instead. Published by: SearchSecurity.com



Cloud: A security risk and opportunity

Mon, 15 Jan 2018 24:00:00 EST

With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms. Published by: ComputerWeekly.com



5 Factors to Get the Most Out Of Real-Time Data Analytics

Wed, 10 Jan 2018 24:00:00 EST

Real-time data can help make your business more responsive to problems, such as fraud prevention. Published by: DataTorrent



Top 10 ASEAN IT stories of 2017

Mon, 15 Jan 2018 24:00:00 EST

In this review of the top 10 Computer Weekly articles on IT in ASEAN, we look at what countries across the region are doing to drive adoption of emerging technologies such as artificial intelligence (AI) and the internet of things (IoT), raise their cyber security capabilities amid growing cyber threats, and draw more women into the IT industry. Published by: ComputerWeekly.com



Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

Fri, 12 Jan 2018 24:00:00 EST

In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now. Published by: ComputerWeekly.com



Computer Weekly – 9 January 2018: Countdown to GDPR

Mon, 08 Jan 2018 24:00:00 EST

In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now. Published by: ComputerWeekly.com



Advanced Threats: 4 New Attacks to Get Ahead Of

Sat, 06 Jan 2018 24:00:00 EST

Uncover how to protect your enterprise against new malware variants and advanced attacks, which are emerging every day by utilizing our brand new guide: Advanced Threats: 4 New Attacks to Get Ahead Of. Published by: TechTarget



How to update, automate your IR processes

Thu, 04 Jan 2018 24:00:00 EST

In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes. Published by: Booz Allen Hamilton



CW Middle East Jan to Mar 2018

Thu, 11 Jan 2018 24:00:00 EST

The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system. Published by: ComputerWeekly.com



How SMBs are Changing their Security Tactics

Wed, 03 Jan 2018 24:00:00 EST

Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness. Published by: Booz Allen Hamilton



Essential guide to dealing with a data breach

Wed, 03 Jan 2018 24:00:00 EST

Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences Published by: ComputerWeekly.com



What GDPR privacy requirements mean for U.S. businesses

Tue, 26 Dec 2017 24:00:00 EST

Enforcement of the EU's new GDPR privacy regulations is imminent, and potential fines send a clear message to companies to protect their customers, or else. Published by: SearchSecurity.com



How Automated Security Workflows Help you Stay Above Water

Fri, 22 Dec 2017 24:00:00 EST

Explore the changing nature of risk in the data center and how network virtualization enables automation of your security operations. Published by: VMware



CIO Trends #6: Nordics

Fri, 15 Dec 2017 24:00:00 EST

In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders. Published by: ComputerWeekly.com



CW Europe – December 2017

Thu, 14 Dec 2017 24:00:00 EST

In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid. Published by: ComputerWeekly.com



Cloud-based backup services are a safety net in tricky times

Tue, 05 Dec 2017 24:00:00 EST

Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides. Published by: SearchDataBackup.com



The Tug of War Between UBA and SIEM

Fri, 01 Dec 2017 24:00:00 EST

In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham. Published by: SearchSecurity.com



Cloud Computing in Healthcare: CIOs Embrace the Benefits and Value

Tue, 28 Nov 2017 24:00:00 EST

Healthcare orgs are now seeing the value of cloud computing and its role in value-based care, pop health and patient engagement. Inside this expert guide, uncover opinions of 4 CIOs on 3 well-known cloud computing options and benefits of cloud computing in healthcare. Plus, explore a Q&A with Joshua Newman, Chief Medical Officer at Salesforce. Published by: Salesforce.com



Web security: Important but often overlooked

Fri, 24 Nov 2017 24:00:00 EST

In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls. Published by: ComputerWeekly.com



Gamma International: The Macedonia files - Source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

Thu, 23 Nov 2017 24:00:00 EST

This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia. Published by: ComputerWeekly.com



Introducing the Delphix Dynamic Data Platform

Wed, 15 Nov 2017 24:00:00 EST

IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes. Published by: Delphix



EU General Data Protection Regulation

Wed, 15 Nov 2017 24:00:00 EST

This webcast covers the importance of understanding the GDPR, and steps you can take to comply with the new regulation, with the use of a database that integrates data better and faster, and that's cost efficient. Published by: MarkLogic



CIOs Discuss Digital Transformation

Wed, 15 Nov 2017 24:00:00 EST

Learn from CIOs about their top challenges to meet today's data demands as the need for digital transformation accelerates. Published by: Delphix



Step Up Your Security and Privacy with Data Masking

Wed, 15 Nov 2017 24:00:00 EST

With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is not an easy task, especially with new mandates like GDPR and HIPAA. This webcast explores how you can use data masking to keep data protected. Published by: Delphix



Essential Guide: What the EU Data Protection Regulation changes mean to you

Mon, 20 Nov 2017 24:00:00 EST

This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation. Published by: ComputerWeekly.com



Computer Weekly – 21 November 2017: What can intent-based networking do for you?

Fri, 17 Nov 2017 24:00:00 EST

In this week's Computer Weekly, intent-based networking promises to optimise networks through automation and analytics, but can it deliver? Gartner says the CIO role continues to evolve and IT leaders need to champion digital change – we examine the issues. And we find out how security analytics can help deal with cyber threats. Read the issue now. Published by: ComputerWeekly.com



Essential Guide: Securing hybrid IT infrastructure

Thu, 16 Nov 2017 24:00:00 EST

In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud. Published by: ComputerWeekly.com



Payer's Place in the Healthcare Ecosystem Keys to Success

Thu, 02 Nov 2017 24:00:00 EDT

Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value. Published by: HealthEdge



CW ASEAN – November 2017: How managed security services help to reduce cyber risk

Fri, 10 Nov 2017 24:00:00 EST

In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of. Published by: ComputerWeekly.com



CW ANZ – November 2017: On cyber alert

Fri, 10 Nov 2017 24:00:00 EST

In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security. Published by: ComputerWeekly.com



Real- World Examples: ROI- Results

Thu, 02 Nov 2017 24:00:00 EDT

Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more. Published by: HealthEdge



Fintech & the digital customer experience

Thu, 09 Nov 2017 24:00:00 EST

In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years. Published by: ComputerWeekly.com



Choosing the right DRaaS provider

Fri, 03 Nov 2017 24:00:00 EDT

'Storage' magazine examines how to screen disaster recovery-as-a-service providers, as well as evolving cold data storage and file sync-and-share offerings. Published by: SearchStorage.com



CW Benelux November 2017

Thu, 09 Nov 2017 24:00:00 EST

The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up. Published by: ComputerWeekly.com



The Case for Modern SOCs

Thu, 02 Nov 2017 24:00:00 EDT

In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more. Published by: SearchSecurity.com



IoT Privacy and Security

Thu, 02 Nov 2017 24:00:00 EDT

Learn more about IoT attacks that could be threatening your enterprise by taking our Endpoint Security Survey and downloading our expert guide: IoT Privacy and Security. As a bonus for participating, claim a DevSecOps resource upon completion. Published by: TechTarget



Basic SIEM Analytics Steps to Know

Thu, 02 Nov 2017 24:00:00 EDT

All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Inside this guide, experts Karen Scarfone and Johna Johnson reveal tips on how to filter through data securely and catch threats before they harm your organization. Published by: TechTarget



Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

Fri, 27 Oct 2017 24:00:00 EDT

In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now. Published by: ComputerWeekly.com



Multi-factor Authentication for dummies

Fri, 27 Oct 2017 24:00:00 EDT

The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more. Published by: iovation, Inc.



Five Reasons to Reevaluate Your Current Backup Approach

Fri, 27 Oct 2017 24:00:00 EDT

By downloading this resource, you'll discover 5 reasons you may need to reevaluate your current backup approach. Read on to see a platform that enables instant recovery from ransomware, supports all major hypervisors, and more. Published by: Acronis



Beyond the Router: Architecting an Application-Driven WAN Edge

Thu, 26 Oct 2017 24:00:00 EDT

In this white paper, gain a stronger understanding of the benefits associate with moving towards a software-defined, application-driven WAN. Published by: Silver Peak



Technology Evolves - Your Backup Should Too

Thu, 26 Oct 2017 24:00:00 EDT

As technology evolves and become more complex, your security stance should too. Explore this white paper to gain insight into how you can boost your security backup strategy to protect against ransomware, stop data loss, and improve compliance and validity of your recovery. Published by: Acronis



Explore the latest enterprise mobile security technology

Thu, 26 Oct 2017 24:00:00 EDT

As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats. Published by: SearchMobileComputing



Why Network Monitoring is Important for Cybersecurity Readiness

Wed, 25 Oct 2017 24:00:00 EDT

Our experts explain how consolidating traffic through known secure gateways and watching traffic closely with a variety of monitoring tools can improve cybersecurity readiness. Published by: LiveAction



Case Study: Quadruple Backup Speed and Blocks Ransomware Attacks with Backup Platform

Tue, 24 Oct 2017 24:00:00 EDT

This case study explores how Johnson Electric, one of the world's largest electrical providers, protected their organization against ransomware targeting their large amount of data. Published by: Acronis



How Cloud is Reshaping Digital ECM Strategies

Thu, 19 Oct 2017 24:00:00 EDT

In this expert e-guide, we explore some of the new and evolving trends in cloud-based ECM. Discover how to prioritize the capabilities that matter most to your content management strategy and weigh considerations like on-prem vs. cloud deployments, AI capabilities, advanced collaboration tools, security, and more. Published by: Citrix



Balancing ECM User Experiences with IT Control and Security

Thu, 19 Oct 2017 24:00:00 EDT

In this expert e-guide, we explore how you can deliver quality ECM user experiences without sacrificing IT control or security. Learn how to strike the balance and discover 7 features that help you deliver a better user experience. Published by: Citrix



New Cybersecurity Regulations Adopted to Protect Financial Systems & Information

Fri, 13 Oct 2017 24:00:00 EDT

According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches. Published by: HID Global