Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
data  ddos  enterprise  guide  iot botnets  iot  learn  paper  published computerweekly  published  security  white paper  white 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Wed, 22 Nov 2017 16:20:13 EST

Last Build Date: Wed, 22 Nov 2017 16:20:13 EST

 



Introducing the Delphix Dynamic Data Platform

Wed, 15 Nov 2017 24:00:00 EST

In this webcast, hear from Patrick Lightbody of Delphix, about the need to rethink the approach to data management and access to data, which will require significant changes among people and processes. Published by: Delphix



EU General Data Protection Regulation with MarkLogic

Wed, 15 Nov 2017 24:00:00 EST

This webcast covers the importance of understanding the GDPR, and the steps to take to achieve and manage compliance, with the use of a database that integrates data better, faster, with less cost. Listen in to learn about the steps your organization should take to ensure compliance, and how you stay on top of the process along the way. Published by: MarkLogic



CIOs Discuss Digital Transformation

Wed, 15 Nov 2017 24:00:00 EST

Learn from CIOs about their top challenges to meet today's data demands as the need for digital transformation accelerates. Published by: Delphix



Step Up Your Security and Privacy with Data Masking

Wed, 15 Nov 2017 24:00:00 EST

With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is not an easy task, especially with new mandates like GDPR and HIPAA. This webcast explores how you can use data masking to keep data protected. Published by: Delphix



How Can Privileged Access Accounts Be Managed in Large Companies?

Mon, 13 Nov 2017 24:00:00 EST

According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access. Published by: One Identity



How can organizations get control over privileged identity management?

Tue, 14 Nov 2017 24:00:00 EST

Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information Published by: One Identity



Essential Guide: What the EU Data Protection Regulation changes mean to you

Mon, 20 Nov 2017 24:00:00 EST

This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation. Published by: ComputerWeekly.com



Computer Weekly – 21 November 2017: What can intent-based networking do for you?

Fri, 17 Nov 2017 24:00:00 EST

In this week's Computer Weekly, intent-based networking promises to optimise networks through automation and analytics, but can it deliver? Gartner says the CIO role continues to evolve and IT leaders need to champion digital change – we examine the issues. And we find out how security analytics can help deal with cyber threats. Read the issue now. Published by: ComputerWeekly.com



Essential Guide: Securing hybrid IT infrastructure

Thu, 16 Nov 2017 24:00:00 EST

In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud. Published by: ComputerWeekly.com



Payer's Place in the Healthcare Ecosystem Keys to Success

Thu, 02 Nov 2017 24:00:00 EDT

Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value. Published by: HealthEdge



CW ASEAN – November 2017: How managed security services help to reduce cyber risk

Fri, 10 Nov 2017 24:00:00 EST

In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of. Published by: ComputerWeekly.com



CW ANZ – November 2017: On cyber alert

Fri, 10 Nov 2017 24:00:00 EST

In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security. Published by: ComputerWeekly.com



Real- World Examples: ROI- Results

Thu, 02 Nov 2017 24:00:00 EDT

Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more. Published by: HealthEdge



Fintech & the digital customer experience

Thu, 09 Nov 2017 24:00:00 EST

In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years. Published by: ComputerWeekly.com



Choosing the right DRaaS provider

Fri, 03 Nov 2017 24:00:00 EDT

'Storage' magazine examines how to screen disaster recovery-as-a-service providers, as well as evolving cold data storage and file sync-and-share offerings. Published by: SearchStorage.com



CW Benelux November 2017

Thu, 09 Nov 2017 24:00:00 EST

The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up. Published by: ComputerWeekly.com



The Case for Modern SOCs

Thu, 02 Nov 2017 24:00:00 EDT

In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more. Published by: SearchSecurity.com



IoT Privacy and Security

Thu, 02 Nov 2017 24:00:00 EDT

Learn more about IoT attacks that could be threatening your enterprise by taking our Endpoint Security Survey and downloading our expert guide: IoT Privacy and Security. As a bonus for participating, claim a DevSecOps resource upon completion. Published by: TechTarget



Basic SIEM Analytics Steps to Know

Thu, 02 Nov 2017 24:00:00 EDT

All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Inside this guide, experts Karen Scarfone and Johna Johnson reveal tips on how to filter through data securely and catch threats before they harm your organization. Published by: TechTarget



Mastering the Art of Database Backup and Recovery

Thu, 26 Oct 2017 24:00:00 EDT

DBAs are usually concerned with backing up their databases, but they should spend more time focusing on database recovery as part of the backup process. Read this expert guide to learn how to cover all your DB recovery bases and how to back up data more efficiently. Published by: Oracle Corporation UK Ltd



Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

Fri, 27 Oct 2017 24:00:00 EDT

In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now. Published by: ComputerWeekly.com



Multi-factor Authentication for dummies

Fri, 27 Oct 2017 24:00:00 EDT

The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more. Published by: iovation, Inc.



The Critical Elements of IoT Security

Fri, 27 Oct 2017 24:00:00 EDT

IoT devices are on the rise. Read this white paper to gain a stronger understanding of how to build an IoT security strategy to help increase your network performance and reliability. Published by: Fortinet, Inc.



Beyond the Router: Architecting an Application-Driven WAN Edge

Thu, 26 Oct 2017 24:00:00 EDT

In this white paper, gain a stronger understanding of the benefits associate with moving towards a software-defined, application-driven WAN. Published by: Silver Peak



Strategies for the Enterprise to Address Today's Top Security Vulnerabilities

Thu, 26 Oct 2017 24:00:00 EDT

In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them. Published by: Fortinet, Inc.



Preparing for the General Data Protection Regulation

Thu, 26 Oct 2017 24:00:00 EDT

Gain a stronger understanding of GDPR compliance and implications for your network security. Published by: Fortinet, Inc.



6 Key Use Cases for Securing Your Organization’s Cloud Workloads

Thu, 26 Oct 2017 24:00:00 EDT

According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure. Published by: CyberArk Software, Inc



Explore the latest enterprise mobile security technology

Thu, 26 Oct 2017 24:00:00 EDT

As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats. Published by: SearchMobileComputing



KuppingerCole Report Leadership Compass

Wed, 25 Oct 2017 24:00:00 EDT

Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers. Published by: CyberArk Software, Inc and KuppingerCole



New Security Challenges Redefine Risk and Vulnerability

Wed, 25 Oct 2017 24:00:00 EDT

In this white paper, gain a stronger understanding of the network security challenges organizations still need to overcome. Published by: Fortinet, Inc.



A Privileged Account Security Approach To GDPR Readiness

Wed, 25 Oct 2017 24:00:00 EDT

It is difficult to achieve GDPR compliance without securing the privileged pathways to the systems containing personal data. Key into this white paper to learn more about GDPR and how you can protect personal data within your organization. Published by: CyberArk Software, Inc



Why Network Monitoring is Important for Cybersecurity Readiness

Wed, 25 Oct 2017 24:00:00 EDT

Our experts explain how consolidating traffic through known secure gateways and watching traffic closely with a variety of monitoring tools can improve cybersecurity readiness. Published by: LiveAction



Absolute Persistence

Wed, 25 Oct 2017 24:00:00 EDT

Technology never waits, and in the past 20 years we've seen plenty of change. Gone are the days when IT could support the business with one make of PC and a phone. Explore this white paper to discover how to secure and manage endpoints so your organization is protected, business data is secured, and end user productivity is supported. Published by: Absolute



IoT Botnets: The Stakes Have Changed. Have you?

Mon, 21 Nov 2016 24:00:00 EST

The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT devices attract DDoS security attacks. Then, find out how your organization can shift towards a more secure and reliable IoT future. Published by: Arbor Networks



At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

Wed, 25 Oct 2017 24:00:00 EDT

Gartner estimates that by 2019, cloud security audits will routinely include a model that scores risk and implementation effectiveness separately. Explore this white paper to learn how you can effectively mitigate the risks threatening your enterprise's data in the cloud. Published by: Absolute



Make the Most of Windows 10: How User Training Can Help

Fri, 20 Oct 2017 24:00:00 EDT

Download this e-guide to find out how proper training can help make the most of your Windows 10 deployment. Published by: Citrix



How to create a near-perfect Windows 10 deployment

Fri, 20 Oct 2017 24:00:00 EDT

Windows 10 deployments can be a challenge for many IT departments. The OS comes with its fair share of issues related to storage, security, updates and more. Download this e-guide to learn tips to successfully deploy Windows 10 in your organization. Published by: Citrix



How to Close Security Gaps to Stop Ransomware and other Threats

Wed, 25 Oct 2017 24:00:00 EDT

In this e-book, gain a stronger understanding on how protecting your enterprise starts with ensuring coverage across different attack vectors through coordinated Advanced Threat Protection (ATP). Then, find out how IT network pros strive to overcome network security challenges to help increase performance, reliability, and scalability. Published by: Fortinet, Inc.



What is the Best Type of DDoS Protection for my Business?

Wed, 25 Oct 2017 24:00:00 EDT

Cisco predicts that by 2020, 17 million DDoS attacks will occur annually. In this white paper, learn which type of DDoS protection is best for your business. Published by: Arbor Networks



How Cloud is Reshaping Digital ECM Strategies

Thu, 19 Oct 2017 24:00:00 EDT

In this expert e-guide, we explore some of the new and evolving trends in cloud-based ECM. Discover how to prioritize the capabilities that matter most to your content management strategy and weigh considerations like on-prem vs. cloud deployments, AI capabilities, advanced collaboration tools, security, and more. Published by: Citrix



Balancing ECM User Experiences with IT Control and Security

Thu, 19 Oct 2017 24:00:00 EDT

In this expert e-guide, we explore how you can deliver quality ECM user experiences without sacrificing IT control or security. Learn how to strike the balance and discover 7 features that help you deliver a better user experience. Published by: Citrix



5 questions to ask when considering a DDoS Managed Service

Tue, 24 Oct 2017 24:00:00 EDT

When evaluating DDoS protection for your business, what are the top questions you should ask? This white paper offers 5 questions to ask to ensure you are picking the best DDoS protection strategy for your enterprise. Published by: Arbor Networks



Advantages of a Fabric vs. Platform Approach to Enterprise Security

Tue, 24 Oct 2017 24:00:00 EDT

It is challenging to know which strategy is best for your enterprise protection. This white paper explores the differences between a fabric and a platform approach to your security framework, and reveals how you can protect your enterprise from security threats. Published by: Fortinet, Inc.



IoT Botnets and DDoS Attacks: The Stakes Have Changed

Thu, 06 Apr 2017 24:00:00 EDT

The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT botnets quickly spread. Then, find out how your organization can shift towards a more secure and reliable IoT future. Published by: Arbor Networks



The Stakes Have Changed: No End in Sight for DDoS Attack Size Growth

Tue, 24 Oct 2017 24:00:00 EDT

In this resource, gain a better understanding of how IoT devices become vulnerable to the spread of IoT botnets, so your organization can move towards a more secure and reliable IoT future. Published by: Arbor Networks



New Cybersecurity Regulations Adopted to Protect Financial Systems & Information

Fri, 13 Oct 2017 24:00:00 EDT

According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches. Published by: HID Global



A Risk Manager’s Guide to the General Data Protection Regulation (GDPR)

Mon, 23 Oct 2017 24:00:00 EDT

Noncompliance with the GDPR will result in a maximum fine of €20,000,000 or 4% of an organization's worldwide revenue, whichever is greater. In this white paper, gain a deeper understanding of the GDPR, how it will affect your organization, and how you can prepare for it. Published by: BitSight



IOT Botnets & DDoS Attacks: The Stakes Have Changed

Mon, 23 Oct 2017 24:00:00 EDT

In this resource, gain a better understanding for DDoS mitigation best practices and learn how to prevent the growth of IoT botnets. Published by: Arbor Networks



Why IPS Devices and Firewalls Fail to Stop DDoS Threats

Mon, 23 Oct 2017 24:00:00 EDT

According to data center respondents of Arbor's Worldwide Infrastructure Security report, 67% have experienced a multi-vector DDoS attack. In addition, 45% of respondents experienced firewall or IPS device failure during an attack. This white paper reveals why IPS devices and firewalls can't stop DDoS attacks. Published by: Arbor Networks



The APAC Guide to Data Protection & GDPR

Mon, 23 Oct 2017 24:00:00 EDT

In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region. Published by: ComputerWeekly.com