Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cloud  data protection  data  expert guide  gdpr  general data  guide  learn  protection regulation  protection  published  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Wed, 18 Oct 2017 16:25:18 EDT

Last Build Date: Wed, 18 Oct 2017 16:25:18 EDT

 



Complying with GDPR: What All Organizations Need to Know

Wed, 18 Oct 2017 24:00:00 EDT

With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more. Published by: Absolute



The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business

Wed, 18 Oct 2017 24:00:00 EDT

According to Arbor Network's Worldwide Infrastructure Security Report, 93% experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. This white paper reveals how DDoS attacks have evolved and changed over time. Published by: Arbor Networks



What does a CISO do now? It's a changing, increasingly vital role

Wed, 11 Oct 2017 24:00:00 EDT

What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever. Published by: SearchSecurity.com



Top 5 Security Challenges Brought on by Mobile and Cloud

Wed, 27 Sep 2017 24:00:00 EDT

½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more. Published by: Entrust, Inc.



SAP HANA and IBM Power Systems: Better Together

Mon, 09 Oct 2017 24:00:00 EDT

If you're looking to accelerate your ability to leverage SAP data and generate real-time insights, you may want to consider examining the servers that support your key apps and databases like SAP HANA. Learn about IBM Power Systems and how they measure up when compared to traditional x86-based servers. Published by: EOH IBM



Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR

Mon, 09 Oct 2017 24:00:00 EDT

In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance. Published by: SearchSecurity.com



Top 5 Security Challenges Brought on by Mobile and Cloud

Wed, 27 Sep 2017 24:00:00 EDT

50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing. Published by: Entrust, Inc.



Security Analytics

Mon, 09 Oct 2017 24:00:00 EDT

This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices. Published by: ComputerWeekly.com



Key software development trends to drive business success

Mon, 09 Oct 2017 24:00:00 EDT

In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes. Published by: ComputerWeekly.com



The Human Factor 2017

Fri, 06 Oct 2017 24:00:00 EDT

90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks. Published by: Proofpoint, Inc.



Turning the Tide Against Ransomware

Thu, 05 Oct 2017 24:00:00 EDT

WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out. Published by: Proofpoint, Inc.



Your Security Sandbox Won't Catch it all: The Phishing Problem

Wed, 04 Oct 2017 24:00:00 EDT

Take a look at this webcast to uncover different types of email threats through various applications and what your organization can do to reduce your vulnerabilities against malware. Published by: Proofpoint, Inc.



Protecting Data After the Digital Disruption

Wed, 04 Oct 2017 24:00:00 EDT

Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more. Published by: Proofpoint, Inc.



Cloud Security Certifications 101

Mon, 02 Oct 2017 24:00:00 EDT

Fill out our Network Security Survey to access our exclusive Cloud Security Certifications 101 guide. Experts Ed Tittel and Mary Kyle examine cloud security certifications, both vendor-neutral and vendor-specific, so that you can find one to demonstrate your skillset. Published by: TechTarget



Steps to Protect Your Growing Data

Mon, 02 Oct 2017 24:00:00 EDT

The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging. In this issue of Information Security, security experts examine data protection risks and considerations for implementing a data - centric security model. Published by: SearchSecurity.com



Encryption Buyer's Guide: 5 Vendor Reviews

Mon, 02 Oct 2017 24:00:00 EDT

Read Encryption Buyer's Guide: 5 Vendor Reviews to find out which encryption strategy is right for you. Security expert, Karen Scarfone reviews 5 encryption vendors to help with your decision. See how these tools compare to fit your needs. Published by: TechTarget



Tips for Testing Both Cloud & Legacy DR

Wed, 27 Sep 2017 24:00:00 EDT

In this expert guide, learn how to compare legacy DR programs against the new disaster-recovery-as-a-service (DRaaS) programs based in the cloud. Then, learn 20 best practices for ensuring that your DRaaS vendor will help you frequently test your program to ensure optimal performance. Published by: TeraGo Networks



How to Evolve Your Infosec Program for Emerging Threats

Mon, 02 Oct 2017 01:09:00 EDT

Just in: Your advanced threats guide has arrived. Inside How to Evolve Your Infosec Program for Emerging Threats, Nick Lewis explains how cybercriminals are using APTs, and what you can do about it. Take our Endpoint Security Survey to access this popular guide, as well as a bonus resource for your time on why security in DevOps is essential. Published by: TechTarget



Building the Best Backup Plan for Today's Storage Environment

Thu, 21 Sep 2017 24:00:00 EDT

In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more. Published by: Iron Mountain



SSO in the Cloud and Mobile Era

Tue, 26 Sep 2017 24:00:00 EDT

Does enterprise single sign-on (SSO) provide adequate security? Our exclusive resource, SSO in the Cloud and Mobile Era, explores the promises and challenges ahead for SSO technology. Published by: TechTarget



Why Security in DevOps is Essential

Tue, 26 Sep 2017 24:00:00 EDT

Integrating security into the DevOps process is important to meet security and compliance requirements, yet many organizations aren't sure where to start. We're here to help. In our guide, Why Security in DevOps is Essential, discover 3 steps to improve DevOps and security. Simply take our Endpoint Security Survey to access this exclusive guide. Published by: TechTarget



Encryption Hiding Malware in Half of Cyber Attacks

Fri, 22 Sep 2017 24:00:00 EDT

A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks. Published by: A10 Networks



Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises

Fri, 22 Sep 2017 24:00:00 EDT

Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk. Published by: A10 Networks



How to Address Key SSL Security Issues and Vulnerabilities

Fri, 22 Sep 2017 24:00:00 EDT

Don't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology. Published by: A10 Networks



Is Your IT Security Affecting Your Workforce Productivity?

Thu, 21 Sep 2017 24:00:00 EDT

In this video, Principal Analyst at Forrester Research David K. Johnson demonstrates how to achieve the often-conflicting goals of promoting employee flexibility alongside delivering greater device security. Tune in to overcome the risks BYOD programs, device malware, and more pose to your device landscape. Published by: Dell and Microsoft



Logrythm's Security Analytics Platform: Product Overview

Thu, 14 Sep 2017 24:00:00 EDT

In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment. Published by: LogRhythm, Inc.



SIEM Analysis for Security Professionals

Thu, 14 Sep 2017 24:00:00 EDT

This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise. Published by: LogRhythm, Inc.



Managing Access to Keep Privileged Users' Credentials Secure

Wed, 20 Sep 2017 24:00:00 EDT

Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list. Published by: SearchSecurity.com



Why Security in DevOps is Essential to Software Development

Tue, 19 Sep 2017 24:00:00 EDT

What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so. Published by: SearchSecurity.com



Guide to Early Application Testing and Understanding Dev and Ops Responsibilities

Tue, 19 Sep 2017 24:00:00 EDT

Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices. Published by: IBM



How to Think like a Hacker to Stop Application Security Threats

Tue, 19 Sep 2017 24:00:00 EDT

Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize. Published by: IBM



How to Increase Security for your Login on Mobile Applications

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data. Published by: IBM



How to Secure Mobile Applications in a Private Cloud

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications. Published by: IBM



How to Boost Mobile Application Security

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks. Published by: IBM



How to Build an Enterprise Application Security Program

Mon, 18 Sep 2017 24:00:00 EDT

In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing. Published by: IBM



Data Protection Steps for Ransomware

Mon, 03 Apr 2017 24:00:00 EDT

Forrester Research predicts that ransomware attacks and privacy breaches will escalate in 2017. That means organizations without ransomware protection are taking a huge risk. Access our new guide, Two Quick Data Protection Steps for Ransomware, and find out why it's more important than ever to be proactive in the fight against this epidemic. Published by: TechTarget



Getting Ready for the EU General Data Protection Regulation

Thu, 07 Sep 2017 24:00:00 EDT

The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR. Published by: Ivanti



Single sign-on service requires a cloud-era update

Wed, 13 Sep 2017 24:00:00 EDT

The best SSO for enterprise use must tackle the complexities that mobility and cloud services like identity as a service present. Published by: SearchSecurity.com



Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

Wed, 13 Sep 2017 24:00:00 EDT

This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption. Published by: ComputerWeekly.com



Focus: Datacentre Uptime

Tue, 12 Sep 2017 24:00:00 EDT

In this e-guide, we take a closer look at some high-profile datacentre outages of recent times and assess the toll they took on the companies involved, and look into what providers and consumers can do to protect themselves from downtime. Published by: ComputerWeekly.com



Get Your Company GDPR-Ready: Research Study Results

Wed, 06 Sep 2017 01:01:45 EDT

The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more. Published by: CA Technologies.



Insuring the uninsurable: Is cyber insurance worth its salt?

Tue, 12 Sep 2017 24:00:00 EDT

This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions. Published by: ComputerWeekly.com



GDPR: The State of Play

Mon, 11 Sep 2017 24:00:00 EDT

An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play. Published by: ComputerWeekly.com



Ready, Set, Go: General Data Protection Regulation (GDPR)

Wed, 06 Sep 2017 24:00:00 EDT

With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival. Published by: CA Technologies.



What Does The GDPR Mean To You? How To Improve Your Testing And Keep Your Test Data Compliant

Wed, 06 Sep 2017 24:41:35 EDT

Data breaches are almost an everyday event – but the upcoming General Data Protection Regulation (GDPR) forces you to think differently about data breaches and how they impact your software development and testing process. Learn what you can do to avoid compromising your test data, and how CA Test Data Manager can help. Published by: CA Technologies.



CW Europe – September-November 2017

Thu, 07 Sep 2017 24:00:00 EDT

In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years. Published by: ComputerWeekly.com



Getting Ready for the EU General Data Protection Regulation

Wed, 13 Sep 2017 24:00:00 EDT

The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR. Published by: Ivanti



Druva Phoenix Rises as Disaster Recovery Service

Fri, 01 Sep 2017 24:00:00 EDT

Click inside to learn how, by teaming up with AWS Druva is offering their customers disaster recovery-as-a-service for the first time ever. Published by: Druva Software



IT Security Trends to Know

Tue, 29 Aug 2017 24:00:00 EDT

The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts. Published by: Cisco Umbrella



EU GDPR Compliance Puts Focus on Data Tracking, Encryption

Thu, 31 Aug 2017 24:00:00 EDT

In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance. Published by: Ivanti