Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 23 Feb 2018 13:30:15 EST

Last Build Date: Fri, 23 Feb 2018 13:30:15 EST

 



Making GRC Understandable, Actionable, and Auditable for New Regulations

Wed, 21 Feb 2018 24:00:00 EST

TBD Published by: ServiceNow



Expanding the Threat Intelligence Horizon

Wed, 21 Feb 2018 24:00:00 EST

How is your organization defending and responding to threats? Explore this webcast to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies. Published by: Phantom Cyber



How to Prepare for Cyber Threats in 2018

Wed, 21 Feb 2018 24:00:00 EST

Network-propagating ransomware caused at least $5 billion in losses in 2017, according to Proofpoint. Explore this webcast to uncover a look back into 2017's cyber threats, 2018 threat predictions and top cybersecurity recommendations to protect your organization. Published by: Proofpoint, Inc.



Mobile security trends point to unifying policy and tools

Tue, 20 Feb 2018 24:00:00 EST

Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management. Published by: SearchSecurity.com



Protecting Your Sensitive Data

Wed, 14 Feb 2018 24:00:00 EST

Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud. Published by: Symantec



Disaster recovery in the age of cloud

Tue, 20 Feb 2018 24:00:00 EST

The cloud is emerging as a key option for disaster recovery. Its benefits include reduced costs and taking advantage of the provider's skills when you may not have them in-house. But when is it best to go cloud for DR? That's one of the key decision points we address in this e-guide. Published by: ComputerWeekly.com



The Future of Privileged Management

Wed, 14 Feb 2018 24:00:00 EST

The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts. Published by: One Identity



CW Nordics ezine February 2018

Thu, 22 Feb 2018 24:00:00 EST

In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs. Published by: ComputerWeekly.com



Regulating Privileged Access: When to Require Human Approval Workflows

Wed, 14 Feb 2018 24:00:00 EST

Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity. Published by: One Identity



Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

Wed, 14 Feb 2018 24:00:00 EST

In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights. Published by: One Identity



Protect Against Zero Day Threats and Malware

Mon, 12 Feb 2018 24:01:42 EST

Watch this brief video to learn how this browser-as-a-service can help you defend against malware that gets in through unsecured web browsing. Published by: Citrix



Identity Analytics – A more Collective Defense

Wed, 14 Feb 2018 24:00:00 EST

As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task. Published by: One Identity



ASEAN IT Priorities 2018

Mon, 19 Feb 2018 24:00:00 EST

This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure. Published by: ComputerWeekly.com



Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

Fri, 16 Feb 2018 24:00:00 EST

In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now. Published by: ComputerWeekly.com



Employee & Device Monitoring: Dispelling the Myths

Mon, 12 Feb 2018 01:00:59 EST

Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program. Published by: Forcepoint



Forcepoint CASB: Visibility and Control of Cloud Applications

Mon, 12 Feb 2018 24:33:19 EST

Watch this webcast to learn about 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they can provide. Published by: Forcepoint



How to Maintain Control of Documents and Files Shared with Others

Mon, 12 Feb 2018 24:00:00 EST

Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more. Published by: Citrix



ANZ IT Priorities 2018

Fri, 16 Feb 2018 24:00:00 EST

The IT Priorities 2018 survey results underscore what we already know about the ANZ IT landscape - more investments in software and cloud services to buttress digital transformation efforts, including the greater use of artificial intelligence, machine learning and robotics. But there were a few surprises as well Published by: ComputerWeekly.com



Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive

Tue, 05 Dec 2017 24:53:40 EST

This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards. Published by: Splunk



What to Know about SIEM as a Service

Tue, 06 Feb 2018 24:00:00 EST

Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach. Published by: LogRhythm, Inc.



User Behavior Analysis & SIEM

Wed, 07 Feb 2018 24:00:00 EST

In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis. Published by: LogRhythm, Inc.



How to Improve SIEM Systems with Machine Learning

Wed, 07 Feb 2018 24:00:00 EST

In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems. Published by: LogRhythm, Inc.



IoT: Take Control of the Edge

Mon, 05 Feb 2018 24:00:00 EST

With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud. Published by: VMware



Crafting a Cybersecurity Incident Response Plan, Step by Step

Tue, 13 Feb 2018 24:00:00 EST

Is your cybersecurity incident response plan the best it can be? Inside this expert handbook, Johna Till Johnson, Rob Shapland and Mike Villegas uncover step by step instructions to crafting an effective incident response plan and cloud incident response plan for your organization. Published by: SearchSecurity.com



Computer Weekly – 13 February 2018: On the path to diversity in tech

Fri, 09 Feb 2018 24:00:00 EST

In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now. Published by: ComputerWeekly.com



Arcserve Unified Data Protection Cuts Downtime for Cloud DR

Mon, 05 Feb 2018 24:00:00 EST

In this expert-guide, learn about Arcserve's new Unified Data Protection system, which the claim delivers a five-minute recovery time objective and 15-minute recover point objective for data, and figure out if this service is fast enough for you. Published by: arcserve



CW ASEAN – February 2018: European data law: be aware and prepare

Thu, 08 Feb 2018 24:00:00 EST

Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses. Published by: ComputerWeekly.com



CW ANZ – February 2018: Prepare for EU data law

Thu, 08 Feb 2018 24:00:00 EST

Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws. Published by: ComputerWeekly.com



The next wave of IoT in Asia: What to expect in 2018

Thu, 08 Feb 2018 24:00:00 EST

In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions. Published by: ComputerWeekly.com



Computer Weekly Buyer's Guide to EU General Data Protection Regulation

Wed, 07 Feb 2018 24:00:00 EST

In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules. Published by: ComputerWeekly.com



Five Milestones to GDPR Success

Tue, 06 Feb 2018 24:00:00 EST

The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant. Published by: Proofpoint, Inc.



Fully Managed Microsoft Azure Includes Security Services

Wed, 22 Mar 2017 24:00:00 EDT

Click inside to discover a cloud provider that will help you protect your Azure environments. Read on to learn how they can help to extend your Azure Active Directory IAM system beyond its normal limits, remediate breaches immediately with pre-approved actions, and more. Published by: Rackspace



CW Benelux February 2018

Thu, 01 Feb 2018 24:00:00 EST

In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities. Published by: ComputerWeekly.com



CISOs Map Out Their 2018 Cybersecurity Plans

Thu, 01 Feb 2018 24:00:00 EST

As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans. Published by: SearchSecurity.com



Endpoint Protection & Device Management

Wed, 24 Jan 2018 24:00:00 EST

The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices. Published by: Seqrite



End-User Security Survey: How Common is Confidential File Sharing?

Fri, 29 Dec 2017 24:00:00 EST

To find out how widespread the unsafe sharing of confidential data has become, Dell commissioned a global survey of 2,608 professionals who handle confidential data at companies with 250 or more employees. Click inside to learn the results. Published by: Dell and Intel



Computer Weekly – 30 January 2018: Davos debates global tech risks

Thu, 25 Jan 2018 24:00:00 EST

In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now. Published by: ComputerWeekly.com



Applying Secure Design Patterns to Microservices Development

Tue, 16 Jan 2018 24:00:00 EST

From a developer's perspective, find out what you can do to improve app security for microservices-based development so that you can find and resolve issues even as you continuously release and iterate code. Published by: WhiteHat Security



Detect Unknown Threats, Reduce Dwell Time, And Accelerate Response

Thu, 30 Nov 2017 24:00:00 EST

Click inside to learn about an endpoint detection and response tool that can help you detect complex attacks. This system offers continual monitoring and analysis of user behavior in your endpoints, and more. Published by: Dell and Intel



2018 Security Predictions for an Unpredictable World

Wed, 24 Jan 2018 24:00:00 EST

Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare. Published by: WhiteHat Security



Why Websites Stay Vulnerable: And What You Can Do About It

Wed, 24 Jan 2018 24:00:00 EST

Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security. Published by: WhiteHat Security



Web Application Authorization and Authentication Explained

Wed, 24 Jan 2018 24:00:00 EST

According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program. Published by: WhiteHat Security



2017 Application Security Statistics Report

Tue, 16 Jan 2018 24:00:00 EST

According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report. Published by: WhiteHat Security



Getting the Most out of your AppSec Program

Tue, 23 Jan 2018 24:00:00 EST

According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program. Published by: WhiteHat Security



Cross-Site Scripting Attacks: Identify and Defend against Malicious Code

Tue, 16 Jan 2018 24:00:00 EST

Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster. Published by: WhiteHat Security



DevSecOps Blueprint

Mon, 22 Jan 2018 24:00:00 EST

The average time to fix vulnerabilities in the DAST industry is 174 days. Take a look at this webcast to uncover successful DevSecOps implementations and data to guide the deployment of DevSecOps in your organization. Published by: WhiteHat Security



Defense-in-depth security now key to keeping IT safe

Fri, 19 Jan 2018 24:00:00 EST

Defense-in-depth security offers one of the most effective approaches to renovating IT security and replacing the outmoded idea of a security perimeter. Published by: SearchSecurity.com



Secure Coding Practices: Avoid Mail Command Injection Attacks

Tue, 16 Jan 2018 24:53:55 EST

Just what is web mail command injection, how does it happen, and what can you do to protect yourself? Get the answers to these questions and more in this webcast, where Zach Jones, Senior Director of TRC Static Analysis explores what makes these threats so unique, as well some best practices for mitigating the damage they can cause. Published by: WhiteHat Security



Secure Coding Practices: Avoid OS Command Injection Attacks

Tue, 16 Jan 2018 24:53:21 EST

Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks. Published by: WhiteHat Security



Computer Weekly – 23 January 2018: Will banking regulations create a new Big Bang?

Fri, 19 Jan 2018 24:00:00 EST

In this week's Computer Weekly, we look at two new financial services regulations, PSD2 and open banking, which promise to revolutionise the industry by opening up customer data. We ask security researchers to explain the Spectre and Meltdown processor flaws. And we examine the NVMe protocol and its likely benefits for storage. Read the issue now. Published by: ComputerWeekly.com