Subscribe: Most Popular White Papers and WebcastsSecurity Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
access  cloud  data  discover  healthcare  learn  management  published  ransomware  secure  security  visibility  white paper  white 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Sat, 24 Sep 2016 13:20:09 EDT

Last Build Date: Sat, 24 Sep 2016 13:20:09 EDT


Safeguarding Vital Data Is a Battle You Can Win

Sat, 24 Sep 2016 24:00:00 EDT

In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way. Published by: Intel Security

Guidance on Healthcare Ransomware Attacks

Fri, 16 Sep 2016 24:00:00 EDT

Learn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated. Published by: OpenDNS

Five Important Steps to Ransomware Remediation in Health IT

Fri, 16 Sep 2016 24:00:00 EDT

Discover five key steps for responding to hospital ransomware attacks within this e-guide. Health IT expert Reda Chouffani will help you better understand the anatomy of ransomware and help you devise a recovery plan if ransomware should strike. Published by: OpenDNS

Next-Gen Autentication

Thu, 15 Sep 2016 24:00:00 EDT

This Security classroom explores the latest in authentication methods and technologies. Published by:

Harnessing the Power of Metadata for Security

Wed, 31 Aug 2016 24:00:00 EDT

Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation. Learn how to enable more in-depth security analysis of traffic that is focused on the areas of concern, ultimately resulting in faster time to detection, response, and mitigation. Published by: Gigamon

GigaSECURE Security Delivery Platform

Tue, 04 Aug 2015 24:00:00 EDT

Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time. Published by: Gigamon

5 Considerations for Securing Hybrid Clouds

Tue, 31 May 2016 24:00:00 EDT

This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology. Published by: Intel Security

Your Blueprint to Securing Your Public and Hybrid Cloud

Fri, 23 Sep 2016 24:00:00 EDT

Discover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in. Published by: Fortinet, Inc.

Defining Security for Today’s Cloud Environments

Fri, 23 Sep 2016 24:00:00 EDT

Uncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn why organizations need to augment traditional firewalls and security appliances with expanded protection for east-west traffic, both within internal networks and across clouds. Published by: Fortinet, Inc.

Policing cyber crime

Fri, 23 Sep 2016 24:00:00 EDT

This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space Published by:

Securing Data Access Within the Healthcare Industry

Wed, 31 Aug 2016 24:00:00 EDT

Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience. Published by: VASCO Data Security International

Unified Infrastructure Management for Databases: An Overview

Wed, 31 Dec 2014 24:00:00 EST

Discover unified database infrastructure management that delivers comprehensive monitoring across multiple database servers, as well as will uncover performance bottlenecks. Access now to ensure database integrity with a solution that supports Oracle, IBM DB2, SQL Server, Sybase, and IBM Informix. Published by: CA Technologies

Better Together: Security and Collaboration with Backup and Box

Fri, 23 Sep 2016 24:00:00 EDT

This white paper examines a modern data mobility and security strategy that incorporates both a file sync and share app along with a comprehensive endpoint data backup platform. Access now to find out why just sync and share isn't enough to stand alone and mitigate the potentially permanent loss of critical data. Published by: Code42

Cloud Computing Security Considerations and Requirements

Thu, 22 Sep 2016 24:00:00 EDT

In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more. Published by: Palo Alto Networks

Analysts Reveal how to Secure SaaS

Thu, 22 Sep 2016 24:00:00 EDT

This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps. Published by: Palo Alto Networks

Importance of Incident Response Collaboration

Wed, 21 Sep 2016 24:00:00 EDT

This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs. Published by: Dimension Data

Digital Identity Insights: Dangerous Access, IoT Security, and Compliance

Wed, 16 Sep 2015 24:00:00 EDT

Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology. Published by: Certified Security Solutions (CSS)

TAG Cyber Report: 2017 Security Annual – Vol. 1

Wed, 31 Aug 2016 24:00:00 EDT

This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional. Published by: Digital Guardian

Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van

Thu, 22 Sep 2016 24:00:00 EDT

Discover why choosing the right cloud platform can make or break your PACS. Additionally, view the key benefits accrued from cloud PACS adoption, including the elimination of CDs, seamless cloud delivery and collaboration, reduced time-to-care delivery, and enhanced relationships with referring physicians. Published by: Ambra

How to Conquer Security on the Public, Private, and Hybrid Clouds

Thu, 22 Sep 2016 24:00:00 EDT

Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more. Published by: Fortinet, Inc.

The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?

Wed, 31 Aug 2016 24:00:00 EDT

Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it. Published by: SecureWorks

Companies, Digital Transformation and Information Privacy: The Next Steps

Thu, 22 Sep 2016 24:00:00 EDT

The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment. Published by: Hewlett Packard Enterprise

The Security Fabric of The Cloud

Fri, 22 Apr 2016 24:00:00 EDT

This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat. Published by: Fortinet, Inc.

How to Secure Data Access Within the Healthcare Industry

Wed, 31 Aug 2016 24:00:00 EDT

Access this white paper to learn the changing role of technology within the health sector and why healthcare organizations continue to experience major data breaches. Discover best practices to help your organization integrate and adopt security without compromising the patient experience. Published by: VASCO Data Security International

Securing Office 365 Is Easier Than You Think

Thu, 22 Sep 2016 24:00:00 EDT

SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more. Published by: Palo Alto Networks

Get Smarter Control of Your Certificates and User Keys Right Now

Wed, 22 Jun 2016 24:00:00 EDT

In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows. Published by: Certified Security Solutions (CSS)

Say Hello, Again, to SIEM

Wed, 31 Aug 2016 24:00:00 EDT

SIEM products are ever-changing technologies. Here's what you need to know now about security information and event management tools. Published by:

Penetration Testing Services Data Sheet

Fri, 29 Jul 2016 24:00:00 EDT

Because high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is clearly required. This data sheet details one group of security professionals whose goal is to help you discover vulnerabilities in your computer networks, hardware, and software applications before criminals do. Published by: IBM

Case Study: Jefferson Radiology Implements Cloud VNA

Thu, 22 Sep 2016 24:00:00 EDT

See how Jefferson Radiology, a Connecticut-based innovative practice, revolutionized imaging workflows by replacing their legacy image exchange vendor and migrating to a new cloud-enabled PACS. Learn about best-in-class image management that will automate workflows and provide seamless cloud access to records. Published by: Ambra

Avoid the Five Classic Fails of Enterprise Backup

Mon, 16 May 2016 24:00:00 EDT

Outdated backup technologies and patchwork add unnecessary burdens for IT and end users, increase costs, and leave the business vulnerable to disastrous data breach and data loss. This white paper highlights the five classic fails of enterprise backup, so you can avoid these common missteps. Published by: Code42

Moving Beyond Masking and Subsetting: Realizing the Value of Test Data Management

Sun, 31 Jul 2016 24:00:00 EDT

This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy for IT. Published by: CA Technologies

Questions to Ask Your Cloud Service Provider: Know how your Data will be Protected in the Cloud

Thu, 22 Sep 2016 24:00:00 EDT

As you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more. Published by: Intel Security

Make Hybrid IT Secure: Gain Visibility, Reduce Risk and Strengthen Governance

Wed, 21 Sep 2016 24:00:00 EDT

When you have a hybrid environment you need to ensure security on premise and in the cloud. In these settings threats can be disguised. Get an overview of visibility, governance and privacy considerations. Published by: SecureWorks

Rx for Embedding Security into Vulnerable Healthcare Systems

Wed, 21 Sep 2016 24:00:00 EDT

Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage. Published by: Certified Security Solutions (CSS)

Deriving Value from the Technical Security Test

Wed, 31 Aug 2016 24:00:00 EDT

Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers. Published by: SecureWorks

Securing the Unpatchable

Wed, 21 Sep 2016 24:00:00 EDT

Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies. Published by: Palo Alto Networks

A Certified Concern

Tue, 20 Sep 2016 24:00:00 EDT

Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security. Published by:

Connected Health Cloud: Focus on Healthcare Solutions NOT Infrastructure

Wed, 21 Sep 2016 24:00:00 EDT

This short resource acknowledges that the nature of healthcare is changing. Connectivity is increasingly mandatory, but degradation of security is out of the question. Access now to see how a connected healthcare ecosystem can thrive on the cloud, despite the particular needs of the industry. Published by: CloudMine

Ransomware: Threats, Motivations, and Tools of the Trade

Wed, 21 Sep 2016 24:00:00 EDT

Today's hackers require less money and time than ever before to start their campaign. Learn more about how marketplace dynamics are shifting the scale of the modern attack landscape, and uncover access to a valuable resource for security professionals. Published by: Radware

Who Will CAVE First: Likely Targets of Ransomware

Wed, 21 Sep 2016 24:00:00 EDT

The following resource lists an acronym that highlights four key areas criminals will assess in their decision to target people and companies. Learn how to avoid being a victim by getting inside the mind of a ransomware attacker. Published by: Radware

The Changing Workforce: Automation & the Role of Ex-Hackers

Wed, 21 Sep 2016 24:00:00 EDT

The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more. Published by: Radware

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

Wed, 21 Sep 2016 24:00:00 EDT

Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV. Published by: Palo Alto Networks

IoT: Internet of Things or Internet of Threats?

Wed, 21 Sep 2016 24:00:00 EDT

This research report aims to convey the challenges, threats, and opportunities that C-level security executives face when it comes to information security. Learn why the IoT is one of today's top concerns, and what organizations can do to ensure security. Published by: Radware

Case Study: Disc Comfort Fuses Image Management and the Cloud

Wed, 21 Sep 2016 24:00:00 EDT

Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a cloud imaging suite that will reduce time spent loading and viewing patient CDs. Additionally, discover how transitioning on premise CDs to the cloud for storage and retrieval will transform patient care. Published by: Ambra

Best Practices for Writing Secure iOS and Android Apps

Wed, 21 Sep 2016 24:00:00 EDT

As mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes. Published by: Proofpoint, Inc.

NSS Labs 2016 Breach Detection System (BDS) Group Test Results

Mon, 01 Aug 2016 24:00:00 EDT

Expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection. Published by: Fortinet, Inc.

Advancing Endpoint Security: The Importance of Threat Intelligence, Visibility

Wed, 31 Aug 2016 24:00:00 EDT

Discover how to mix anti-malware capabilities with high-level visibility and behavioral based detection to eliminate endpoint threats. By arming yourself with these weapons, your organization can not only detect threat actors and their tradecraft, but also slash time of response, minimizing the damage they cause. Published by: SecureWorks

CareWell Streamlines Patient Journey & Reduces Risk with Cloud-Enabled PACS

Wed, 21 Sep 2016 24:00:00 EDT

Discover how to streamline image management, reduce risk of data exposure, and eliminate barriers to siloed information across the network by cloud-enabling PACS. Learn from Carewell's case study how to streamline every aspect of the patient journey. Published by: Ambra

Public Key Infrastructure: The New Best Practices

Tue, 20 Sep 2016 24:00:00 EDT

This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations. Published by: Certified Security Solutions (CSS)

Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps

Tue, 20 Sep 2016 24:00:00 EDT

Discover 18 examples of how curated app stores are failing to protect enterprises from malware and dangerous apps, and cannot provide compliance or privacy protection, including: no privacy or security certification standards, the millions of consumer, data-mining apps, narrow definitions of malware, and more. Published by: Proofpoint, Inc.