Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cloud  computer weekly  computerweekly  cyber  data  expert guide  gdpr  guide  published computerweekly  published  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Tue, 24 Apr 2018 16:05:17 EDT

Last Build Date: Tue, 24 Apr 2018 16:05:17 EDT

 



Integrating, Coordinating, and Orchestrating Enterprise Security Tools

Thu, 19 Apr 2018 24:00:00 EDT

Organizations have made significant investments in security technology in the last few years, but these tools are often underutilized due to staff capacity or skills. This webinar explores the security orchestration challenge organizations are facing today. Published by: Proofpoint, Inc.



Data protection: A business imperative

Tue, 24 Apr 2018 24:00:00 EDT

In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act. Published by: ComputerWeekly.com



CISOs Map Out Their 2018 Cybersecurity Plans

Mon, 23 Apr 2018 24:00:00 EDT

As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans. Published by: SearchSecurity.com



Cyber-risk strategies and models for a post-perimeter age

Fri, 20 Apr 2018 24:00:00 EDT

New cyber-risk strategies are essential now that the perimeter is no more. Learn why security pros are considering the zero-trust model, among other options. Published by: SearchSecurity.com



CW ASEAN April 2018

Thu, 12 Apr 2018 24:00:00 EDT

This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality. Published by: ComputerWeekly.com



CW ANZ April 2018

Thu, 19 Apr 2018 24:00:00 EDT

OpenStack's popularity has increased across the globe. A 2017 survey has revealed a 44% increase in OpenStack deployments compared to a year earlier – and 74% of all deployments occurred outside the U.S. In this issue of CW ANZ, we look at how OpenStack has changed the way Australian enterprises operate their IT infrastructure. Published by: ComputerWeekly.com



The EU General Data Protection Regulation

Fri, 06 Apr 2018 24:00:00 EDT

The General Data Protection Regulation (GDPR) gets a lot of buzz for what it will do for data privacy – but how much do you really know about what it means? Download this webcast to learn more about different aspects of GDPR, and discover how businesses can approach getting compliant. Published by: Oracle Cloud



Get your Content Management System GDPR-Ready

Fri, 30 Mar 2018 24:00:00 EDT

In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system. Published by: Box



Information Security: Companies Aren't the Only Ones Migrating to Cloud

Tue, 03 Apr 2018 24:00:00 EDT

Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats. Published by: SearchSecurity.com



Eliminating Cybersecurity Obscurity Through Continuous Security Validation (Webcast)

Tue, 27 Mar 2018 24:00:00 EDT

How is your organization defending against security risks? Explore this webcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems. Published by: NSS Labs



Eliminating Cybersecurity Obscurity Through Continuous Security Validation

Tue, 27 Mar 2018 24:00:00 EDT

How is your organization defending against security risks? Explore this podcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems. Published by: NSS Labs



Mobile and Cloud: Shaping your Content Security

Mon, 26 Mar 2018 24:00:00 EDT

In this e-guide, we explore how to manage sensitive content and documents, wherever they exist. Get tips about your content security options from experts like Forrester Research's Rick Holland, and learn about the potential benefits of mobile document management systems. Published by: Adobe Systems, Inc.



Demystifying the myths of public cloud computing

Tue, 27 Mar 2018 24:00:00 EDT

In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice. Published by: ComputerWeekly.com



Infosec culture: A former helicopter pilot's perspective

Mon, 26 Mar 2018 24:00:00 EDT

In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents. Published by: ComputerWeekly.com



The time is ripe to implement cybersecurity automation

Fri, 23 Mar 2018 24:00:00 EDT

It's past time to implement cybersecurity automation. Learn what automation can do for your IT defenses and how to get started in our latest handbook. Published by: SearchSecurity.com



Authentication 101: What You Need to Know

Tue, 20 Mar 2018 24:00:00 EDT

What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment. Published by: HYPR



Why Your Approach to Data Governance Needs a Major Update

Tue, 20 Mar 2018 24:00:00 EDT

In this webcast, hear how customers are changing their approach to data governance and adapting to new regulations such as GDPR. Published by: Delphix



An Introduction to the FIDO Authentication Standard

Mon, 19 Mar 2018 24:00:00 EDT

63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols. Published by: HYPR



Next generation network security

Wed, 21 Mar 2018 24:00:00 EDT

In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy. Published by: ComputerWeekly.com



Build Multilayered Defense for the Cloud and Endpoints

Mon, 12 Mar 2018 24:00:00 EDT

Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection. Published by: ConvergeOne



Optimizing Endpoint Security for the Enterprise

Mon, 12 Mar 2018 24:00:00 EDT

Given the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks. Published by: ConvergeOne



All You Need to Know about SSO

Fri, 09 Mar 2018 24:00:00 EST

The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access. Published by: HYPR



Your Guide to MFA

Fri, 09 Mar 2018 24:00:00 EST

Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security. Published by: HYPR



Change Agents in the Cybersecurity Era

Mon, 12 Mar 2018 24:00:00 EDT

Take advantage of this opportunity and join our experts in staying up to date with cybersecurity's most pressing topics. Published by: SearchSecurity.com



Data Classification Services and Keeping Cloud Data Secure

Wed, 31 Aug 2016 24:00:00 EDT

In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure. Published by: Data443



GDPR Looms with Organizations Still Unprepared

Sun, 31 Dec 2017 24:00:00 EST

GDPR regulations are looming, and not every company is prepared. In this expert e-guide, explore how data management software suppliers are trying to help companies get on track and avoid stiff GDPR penalties. Published by: Data443



Cloud migration: Choosing the right strategy and tools

Mon, 12 Mar 2018 24:00:00 EDT

In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late. Published by: ComputerWeekly.com



Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice

Fri, 09 Mar 2018 24:00:00 EST

In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now. Published by: ComputerWeekly.com



The Security Benefits of DLP

Wed, 07 Mar 2018 24:00:00 EST

Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches. Published by: InteliSecure



CW ASEAN - March 2018: Time to dial up defences

Thu, 08 Mar 2018 24:00:00 EST

In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats. Published by: ComputerWeekly.com



CW ANZ - March 2018: Report data break-ins - it's the law

Thu, 08 Mar 2018 24:00:00 EST

Cyber security is an increasingly global endeavour with threat actors who know no boundaries unleashing attacks from nearly anywhere in the world. In this month's issue of CW ANZ, we look at how Australia's mandatory data breach notification law underscores recent efforts to lift its cyber security game. Published by: ComputerWeekly.com



Endpoint Defense: Security Controls to Consider Now

Sat, 03 Mar 2018 24:00:00 EST

The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now. Published by: TechTarget



CW Europe – March 2018

Thu, 08 Mar 2018 24:00:00 EST

Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit. Published by: ComputerWeekly.com



Mobile security moving to a unified approach

Wed, 28 Feb 2018 24:00:00 EST

This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security. Published by: ComputerWeekly.com



Computer Weekly buyer's guide to mobile app development

Tue, 27 Feb 2018 24:00:00 EST

In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security. Published by: ComputerWeekly.com



Build your Content Security and Document Management Plan

Thu, 22 Feb 2018 24:00:00 EST

In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates. Published by: Adobe Systems, Inc.



The Right Track to GDPR Compliance

Wed, 21 Feb 2018 24:00:00 EST

The GDPR is creating a pivotal change in how organizations process personal data, and it's clear there are a few areas of misunderstanding surrounding the regulation. Explore this expert e-guide to get a better understanding of the GDPR. Published by: Lynx Technology Partners



The CIO's Guide to GDPR

Wed, 21 Feb 2018 24:00:00 EST

The key to GDPR is a sound approach to data protection across the organization. Access this e-guide to learn from security expert Ed Tucker about data protection preparedness in terms of the GDPR and other regulations. Published by: Lynx Technology Partners



How Prepared are Businesses for GDPR?

Tue, 20 Feb 2018 24:00:00 EST

According to a recent poll of 900 business decision-makers, 31% believe their organization is GDPR compliant, however experts found that only 2% actually appeared compliant. Computer Weekly's security editor, Warwick Ashford dives into GDPR head first and reveals where businesses stand in their journey to GDPR compliance. Published by: Lynx Technology Partners



Advanced Threat Protection Integration

Wed, 21 Feb 2018 24:00:00 EST

How is your enterprise protecting against looming threats? Explore this webcast with Phantom and Symantec to gain insight into integrating an advanced threat protection strategy to detect, investigate and respond to threats. Published by: Phantom Cyber



Security Automation & Orchestration

Wed, 21 Feb 2018 24:00:00 EST

Explore this webcast with Phantom and Palo Alto Networks to uncover a security automation strategy that can help improve network security, advanced endpoint protection, cloud security and more. Published by: Phantom Cyber



Making GRC Understandable, Actionable, and Auditable for New Regulations

Wed, 21 Feb 2018 24:00:00 EST

TBD Published by: ServiceNow



Expanding the Threat Intelligence Horizon

Wed, 21 Feb 2018 24:00:00 EST

How is your organization defending and responding to threats? Explore this webcast with Phantom and McAfee to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies. Published by: Phantom Cyber



Computer Weekly – 27 February 2018: How IT is taking UPS to new heights

Fri, 23 Feb 2018 24:00:00 EST

In this week's Computer Weekly, we talk to UPS CIO Juan Perez to find out how making his IT department "business intimate" is driving innovation. We look at how cloud management platforms can help ease the adoption of multiple public cloud services. And we examine how UK local councils are struggling to deal with cyber attacks. Read the issue now. Published by: ComputerWeekly.com



How to Prepare for Cyber Threats in 2018

Wed, 21 Feb 2018 24:00:00 EST

Network-propagating ransomware caused at least $5 billion in losses in 2017, according to Proofpoint. Explore this webcast to uncover a look back into 2017's cyber threats, 2018 threat predictions and top cybersecurity recommendations to protect your organization. Published by: Proofpoint, Inc.



Mobile security trends point to unifying policy and tools

Tue, 20 Feb 2018 24:00:00 EST

Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management. Published by: SearchSecurity.com



Disaster recovery in the age of cloud

Tue, 20 Feb 2018 24:00:00 EST

The cloud is emerging as a key option for disaster recovery. Its benefits include reduced costs and taking advantage of the provider's skills when you may not have them in-house. But when is it best to go cloud for DR? That's one of the key decision points we address in this e-guide. Published by: ComputerWeekly.com



CW Nordics ezine February 2018

Thu, 22 Feb 2018 24:00:00 EST

In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs. Published by: ComputerWeekly.com



ASEAN IT Priorities 2018

Mon, 19 Feb 2018 24:00:00 EST

This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure. Published by: ComputerWeekly.com



Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

Fri, 16 Feb 2018 24:00:00 EST

In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now. Published by: ComputerWeekly.com