Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cloud  computerweekly  data protection  data  gdpr  guide  learn  published computerweekly  published  security  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Wed, 13 Dec 2017 12:15:17 EST

Last Build Date: Wed, 13 Dec 2017 12:15:17 EST

 



Compare enterprise file-sync-and-sharing software and deployment options

Fri, 08 Dec 2017 24:00:00 EST

Download this e-guide to take a look at different EFSS technologies and cloud deployment models. You'll learn how different vendors stack up in terms of security, user experience, collaboration capabilities, file synchronization and more. Published by: Insight



Compare the top enterprise file-sync-and-sharing vendors

Fri, 08 Dec 2017 24:00:00 EST

Enterprise file sync-and-sharing allows for simpler file access and sharing on the consumer and business level, but with so many vendors in the market it can be difficult to compare options. Download this e-guide to learn about the different capabilities of various vendors and what they can do for your mobile EFSS needs. Published by: Insight



How to create a near-perfect Windows 10 deployment

Thu, 07 Dec 2017 24:00:00 EST

Deploying Windows 10 successfully may seem like a daunting task. In this e-guide find out how IT can make it happen by creating storage room, implementing tough security and knowing what to avoid. Published by: Flexera Software



CW Europe – December 2017

Thu, 14 Dec 2017 24:00:00 EST

In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid. Published by: ComputerWeekly.com



GDPR & Data Protection Webcast

Fri, 01 Dec 2017 24:00:00 EST

Take an in-depth look at this data protection and GDPR webcast to learn more about the regulation and uncover relevant compliance strategies. In addition, hear from a business consultant from the Dutch Ministry of Economic Affairs regarding their experience implementing a data protection strategy. Published by: Oracle



GDPR Security Strategies

Fri, 01 Dec 2017 24:00:00 EST

The GDPR is coming quickly and requires heightened security and compliance with data protection regulations. Take an in-depth look at this webcast to uncover security strategies for GDPR compliance preparation. Published by: Oracle



Cloud-based backup services are a safety net in tricky times

Tue, 05 Dec 2017 24:00:00 EST

Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides. Published by: SearchDataBackup.com



Wi-Fi 2018: Planning your Next Upgrade

Fri, 01 Dec 2017 24:00:00 EST

In this podcast, explore the next-generation Wi-Fi technologies, new security solutions and how cloud-based operational solutions will help increase agility, reliability, availability and lower costs. Published by: Riverbed Technology, Inc.



Security Analysis Principles and Techniques for IT Pros

Fri, 01 Dec 2017 24:00:00 EST

As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool. Published by: SearchSecurity.com



The Tug of War Between UBA and SIEM

Fri, 01 Dec 2017 24:00:00 EST

In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham. Published by: SearchSecurity.com



Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape

Tue, 28 Nov 2017 24:00:00 EST

This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization. Published by: Juniper Networks, Inc.



Cloud Computing in Healthcare: CIOs Embrace the Benefits and Value

Tue, 28 Nov 2017 24:00:00 EST

Healthcare orgs are now seeing the value of cloud computing and its role in value-based care, pop health and patient engagement. Inside this expert guide, uncover opinions of 4 CIOs on 3 well-known cloud computing options and benefits of cloud computing in healthcare. Plus, explore a Q&A with Joshua Newman, Chief Medical Officer at Salesforce. Published by: Salesforce.com



Chrome OS: Secure from Bootup to Shutdown

Tue, 21 Nov 2017 24:00:00 EST

As businesses create more data, it's becoming more important than ever to protect it. Watch this on-demand Google webinar to understand how Chrome OS is uniquely designed with best-in-class security at both the hardware and software levels. Published by: Google Cloud



Web security: Important but often overlooked

Fri, 24 Nov 2017 24:00:00 EST

In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls. Published by: ComputerWeekly.com



Gamma International: The Macedonia files - Source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

Thu, 23 Nov 2017 24:00:00 EST

This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia. Published by: ComputerWeekly.com



Introducing the Delphix Dynamic Data Platform

Wed, 15 Nov 2017 24:00:00 EST

IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes. Published by: Delphix



EU General Data Protection Regulation

Wed, 15 Nov 2017 24:00:00 EST

This webcast covers the importance of understanding the GDPR, and steps you can take to comply with the new regulation, with the use of a database that integrates data better and faster, and that's cost efficient. Published by: MarkLogic



CIOs Discuss Digital Transformation

Wed, 15 Nov 2017 24:00:00 EST

Learn from CIOs about their top challenges to meet today's data demands as the need for digital transformation accelerates. Published by: Delphix



Step Up Your Security and Privacy with Data Masking

Wed, 15 Nov 2017 24:00:00 EST

With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is not an easy task, especially with new mandates like GDPR and HIPAA. This webcast explores how you can use data masking to keep data protected. Published by: Delphix



Essential Guide: What the EU Data Protection Regulation changes mean to you

Mon, 20 Nov 2017 24:00:00 EST

This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation. Published by: ComputerWeekly.com



Computer Weekly – 21 November 2017: What can intent-based networking do for you?

Fri, 17 Nov 2017 24:00:00 EST

In this week's Computer Weekly, intent-based networking promises to optimise networks through automation and analytics, but can it deliver? Gartner says the CIO role continues to evolve and IT leaders need to champion digital change – we examine the issues. And we find out how security analytics can help deal with cyber threats. Read the issue now. Published by: ComputerWeekly.com



Essential Guide: Securing hybrid IT infrastructure

Thu, 16 Nov 2017 24:00:00 EST

In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud. Published by: ComputerWeekly.com



Payer's Place in the Healthcare Ecosystem Keys to Success

Thu, 02 Nov 2017 24:00:00 EDT

Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value. Published by: HealthEdge



CW ASEAN – November 2017: How managed security services help to reduce cyber risk

Fri, 10 Nov 2017 24:00:00 EST

In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of. Published by: ComputerWeekly.com



CW ANZ – November 2017: On cyber alert

Fri, 10 Nov 2017 24:00:00 EST

In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security. Published by: ComputerWeekly.com



Real- World Examples: ROI- Results

Thu, 02 Nov 2017 24:00:00 EDT

Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more. Published by: HealthEdge



Fintech & the digital customer experience

Thu, 09 Nov 2017 24:00:00 EST

In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years. Published by: ComputerWeekly.com



Choosing the right DRaaS provider

Fri, 03 Nov 2017 24:00:00 EDT

'Storage' magazine examines how to screen disaster recovery-as-a-service providers, as well as evolving cold data storage and file sync-and-share offerings. Published by: SearchStorage.com



CW Benelux November 2017

Thu, 09 Nov 2017 24:00:00 EST

The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up. Published by: ComputerWeekly.com



The Case for Modern SOCs

Thu, 02 Nov 2017 24:00:00 EDT

In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more. Published by: SearchSecurity.com



IoT Privacy and Security

Thu, 02 Nov 2017 24:00:00 EDT

Learn more about IoT attacks that could be threatening your enterprise by taking our Endpoint Security Survey and downloading our expert guide: IoT Privacy and Security. As a bonus for participating, claim a DevSecOps resource upon completion. Published by: TechTarget



Basic SIEM Analytics Steps to Know

Thu, 02 Nov 2017 24:00:00 EDT

All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Inside this guide, experts Karen Scarfone and Johna Johnson reveal tips on how to filter through data securely and catch threats before they harm your organization. Published by: TechTarget



Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

Fri, 27 Oct 2017 24:00:00 EDT

In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now. Published by: ComputerWeekly.com



Multi-factor Authentication for dummies

Fri, 27 Oct 2017 24:00:00 EDT

The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more. Published by: iovation, Inc.



Five Reasons to Reevaluate Your Current Backup Approach

Fri, 27 Oct 2017 24:00:00 EDT

By downloading this resource, you'll discover 5 reasons you may need to reevaluate your current backup approach. Read on to see a platform that enables instant recovery from ransomware, supports all major hypervisors, and more. Published by: Acronis



The Critical Elements of IoT Security

Fri, 27 Oct 2017 24:00:00 EDT

IoT devices are on the rise. Read this white paper to gain a stronger understanding of how to build an IoT security strategy to help increase your network performance and reliability. Published by: Fortinet, Inc.



Beyond the Router: Architecting an Application-Driven WAN Edge

Thu, 26 Oct 2017 24:00:00 EDT

In this white paper, gain a stronger understanding of the benefits associate with moving towards a software-defined, application-driven WAN. Published by: Silver Peak



Strategies for the Enterprise to Address Today's Top Security Vulnerabilities

Thu, 26 Oct 2017 24:00:00 EDT

In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them. Published by: Fortinet, Inc.



Preparing for the General Data Protection Regulation

Thu, 26 Oct 2017 24:00:00 EDT

Gain a stronger understanding of GDPR compliance and implications for your network security. Published by: Fortinet, Inc.



6 Key Use Cases for Securing Your Organization’s Cloud Workloads

Thu, 26 Oct 2017 24:00:00 EDT

According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure. Published by: CyberArk Software, Inc



Technology Evolves - Your Backup Should Too

Thu, 26 Oct 2017 24:00:00 EDT

As technology evolves and become more complex, your security stance should too. Explore this white paper to gain insight into how you can boost your security backup strategy to protect against ransomware, stop data loss, and improve compliance and validity of your recovery. Published by: Acronis



Explore the latest enterprise mobile security technology

Thu, 26 Oct 2017 24:00:00 EDT

As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats. Published by: SearchMobileComputing



A Privileged Account Security Approach To GDPR Readiness

Wed, 25 Oct 2017 24:00:00 EDT

It is difficult to achieve GDPR compliance without securing the privileged pathways to the systems containing personal data. Key into this white paper to learn more about GDPR and how you can protect personal data within your organization. Published by: CyberArk Software, Inc



KuppingerCole Report Leadership Compass

Wed, 25 Oct 2017 24:00:00 EDT

Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers. Published by: CyberArk Software, Inc and KuppingerCole



New Security Challenges Redefine Risk and Vulnerability

Wed, 25 Oct 2017 24:00:00 EDT

In this white paper, gain a stronger understanding of the network security challenges organizations still need to overcome. Published by: Fortinet, Inc.



Why Network Monitoring is Important for Cybersecurity Readiness

Wed, 25 Oct 2017 24:00:00 EDT

Our experts explain how consolidating traffic through known secure gateways and watching traffic closely with a variety of monitoring tools can improve cybersecurity readiness. Published by: LiveAction



IoT Botnets: The Stakes Have Changed. Have you?

Mon, 21 Nov 2016 24:00:00 EST

The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT devices attract DDoS security attacks. Then, find out how your organization can shift towards a more secure and reliable IoT future. Published by: Arbor Networks



Make the Most of Windows 10: How User Training Can Help

Fri, 20 Oct 2017 24:00:00 EDT

Download this e-guide to find out how proper training can help make the most of your Windows 10 deployment. Published by: Citrix



How to create a near-perfect Windows 10 deployment

Fri, 20 Oct 2017 24:00:00 EDT

Windows 10 deployments can be a challenge for many IT departments. The OS comes with its fair share of issues related to storage, security, updates and more. Download this e-guide to learn tips to successfully deploy Windows 10 in your organization. Published by: Citrix



How to Close Security Gaps to Stop Ransomware and other Threats

Wed, 25 Oct 2017 24:00:00 EDT

In this e-book, gain a stronger understanding on how protecting your enterprise starts with ensuring coverage across different attack vectors through coordinated Advanced Threat Protection (ATP). Then, find out how IT network pros strive to overcome network security challenges to help increase performance, reliability, and scalability. Published by: Fortinet, Inc.