Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
attacks  data protection  data  expert guide  expert  gdpr  guide  learn  protection  published computerweekly  published  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Mon, 18 Sep 2017 15:35:19 EDT

Last Build Date: Mon, 18 Sep 2017 15:35:19 EDT

 



Single sign-on service requires a cloud-era update

Wed, 13 Sep 2017 24:00:00 EDT

The best SSO for enterprise use must tackle the complexities that mobility and cloud services like identity as a service present. Published by: SearchSecurity.com



Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

Wed, 13 Sep 2017 24:00:00 EDT

This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption. Published by: ComputerWeekly.com



Focus: Datacentre Uptime

Tue, 12 Sep 2017 24:00:00 EDT

In this e-guide, we take a closer look at some high-profile datacentre outages of recent times and assess the toll they took on the companies involved, and look into what providers and consumers can do to protect themselves from downtime. Published by: ComputerWeekly.com



Get Your Company GDPR-Ready: Research Study Results

Wed, 06 Sep 2017 01:01:45 EDT

The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more. Published by: CA Technologies.



Insuring the uninsurable: Is cyber insurance worth its salt?

Tue, 12 Sep 2017 24:00:00 EDT

This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions. Published by: ComputerWeekly.com



GDPR: The State of Play

Mon, 11 Sep 2017 24:00:00 EDT

An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play. Published by: ComputerWeekly.com



Ready, Set, Go: General Data Protection Regulation (GDPR)

Wed, 06 Sep 2017 24:00:00 EDT

With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival. Published by: CA Technologies.



What Does The GDPR Mean To You? How To Improve Your Testing And Keep Your Test Data Compliant

Wed, 06 Sep 2017 24:41:35 EDT

Data breaches are almost an everyday event – but the upcoming General Data Protection Regulation (GDPR) forces you to think differently about data breaches and how they impact your software development and testing process. Learn what you can do to avoid compromising your test data, and how CA Test Data Manager can help. Published by: CA Technologies.



CW Europe – September-November 2017

Thu, 07 Sep 2017 24:00:00 EDT

In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years. Published by: ComputerWeekly.com



Getting Ready for the EU General Data Protection Regulation

Wed, 13 Sep 2017 24:00:00 EDT

The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR. Published by: Ivanti



Druva Phoenix Rises as Disaster Recovery Service

Fri, 01 Sep 2017 24:00:00 EDT

Click inside to learn how, by teaming up with AWS Druva is offering their customers disaster recovery-as-a-service for the first time ever. Published by: Druva Software



Understanding your Full Public Key Infrastructure (PKI) Potential

Thu, 31 Aug 2017 24:00:00 EDT

This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security. Published by: DigiCert



IT Security Trends to Know

Tue, 29 Aug 2017 24:00:00 EDT

The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts. Published by: Cisco Umbrella



EU GDPR Compliance Puts Focus on Data Tracking, Encryption

Thu, 31 Aug 2017 24:00:00 EDT

In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance. Published by: Ivanti



How has 2017 Changed the Data Protection Landscape?

Wed, 30 Aug 2017 24:00:00 EDT

In this e-guide, read an interview with Commvault CEO Bob Hammer, and learn what this industry expert thinks about how factors like ransomware and GDPR prep are changing the backup market. Then, explore how Commvault's backup system combines innovation with tradition to provide 365 degree protection. Published by: Commvault



Basic SIEM Analytics Steps to Know

Sat, 02 Sep 2017 24:00:00 EDT

All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Inside this guide, experts Karen Scarfone and Johna Johnson reveal tips on how to filter through data securely and catch threats before they harm your organization. Published by: TechTarget



Information Security Certifications

Sat, 02 Sep 2017 24:00:00 EDT

There are only 3 easy steps to follow when choosing which security certification to pursue. Find out what they are in are in our information security certifications expert guide. You'll explore many vendor-specific, as well as vendor-neutral, security-related certification programs that occupy this landscape and find out which one is right for you. Published by: TechTarget



Web Security: Now What?

Fri, 01 Sep 2017 24:00:00 EDT

In this handbook, experts dive into the ongoing issues related to TLS security and HTTPS inspection. Uncover more about the journey of computer worms and how they play a role in advanced persistent threats. Published by: SearchSecurity.com



Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

Tue, 29 Aug 2017 24:00:00 EDT

Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic. Published by: Cisco Umbrella



Owner-controlled PKI: The Next Step in Securing IoT

Fri, 01 Sep 2017 24:00:00 EDT

Learn how owner-operated PKI is making strides in becoming the most secure option for IoT users. Published by: DigiCert



Why Healthcare Ransomware Attacks are a Growing Threat to Health IT

Thu, 31 Aug 2017 24:00:00 EDT

There are several factors that leave hospitals vulnerable to ransomware attacks, including the use of legacy systems and the fear of financial penalties due to a data breach. Discover some of the reasons why healthcare systems are experiencing more frequent and costly ransomware attacks. Published by: Cisco Umbrella



Hospital Network Security: Recursive DNS Lookups Yield Threat Insight

Thu, 31 Aug 2017 24:00:00 EDT

Uncover how the University of Kansas Health System adopted a security strategy leveraging DNS to block threats and reduce ransomware attacks. Published by: Cisco Umbrella



The Evolution from Two-Factor Authentication to Identity Assurance

Tue, 29 Aug 2017 24:00:00 EDT

Identity is today's most consequential attack vector, with 81% of confirmed data breaches involving weak, default or stolen passwords. Learn about how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance. Published by: RSA



How Hospitals Can Combat Ransomware Attacks

Thu, 31 Aug 2017 24:00:00 EDT

Learn what separated WannaCry from other ransomware attacks, as well as what hospitals can and should be doing to combat future ransomware attacks. Published by: Cisco Umbrella



Improve Endpoint Security with Advanced Tools and Techniques

Tue, 29 Aug 2017 24:00:00 EDT

Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection. Published by: OPSWAT inc



Antimalware Protection and the Fundamentals of Endpoint Security

Tue, 29 Aug 2017 24:00:00 EDT

In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools. Published by: OPSWAT inc



Add-ons Secure Office 365 from Advanced Attacks

Wed, 30 Aug 2017 24:00:00 EDT

Microsoft has added new features to secure Office 365 against advanced threats, such as email phishing attempts and malicious attachments. In this expert e-guide, learn more about the new layers of protection. Published by: OPSWAT inc



How Should Companies Across the Globe Prepare for EU GDPR Compliance?

Mon, 21 Aug 2017 24:00:00 EDT

As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance Published by: Commvault



How Secure is Open Source Software?

Thu, 24 Aug 2017 24:00:00 EDT

In this expert e-guide, learn about open source security requirements to consider and who should be responsible for security and support. Discover how to keep track of open source software for licensing and security purposes. Published by: Flexera Software



Government IT strategy & challenges in Australia

Wed, 30 Aug 2017 24:00:00 EDT

In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks. Published by: ComputerWeekly.com



How to Find the Best DDoS Attack Prevention and Dection Tools

Tue, 29 Aug 2017 24:00:00 EDT

Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you. Published by: SearchSecurity.com



How ServiceChannel Automated Their AWS Environment with Puppet

Tue, 08 Aug 2017 24:00:00 EDT

ServiceChannel, a small SaaS provider based in New York City, lost their entire data center during Hurricane Sandy. Making their repairs, they needed a way to migrate to AWS Cloud efficiently. Access this webinar for information on the tool they used to automate their AWS environment. Published by: Puppet



Mastering Both Legacy and Cloud Disaster Recovery

Tue, 22 Aug 2017 24:00:00 EDT

As the definition of "disaster" has expanded, DR budgets have stayed the same. In this e-guide, learn what cloud-based disaster recovery can offer you in this new climate, and find 3-step instruction to help you develop a cloud DR plan. Then, take a deeper look at the difference between legacy and cloud-based disaster-recover-as-a-service. Published by: Commvault



Endpoint 101: How Do Different Types of Antivirus Work?

Fri, 18 Aug 2017 24:00:00 EDT

Take a look at this quick 101 endpoint security webcast to learn more about antivirus approaches and their strategies to enhance your endpoint security. Published by: Carbon Black



What is next-generation antivirus, or NGAV?

Fri, 18 Aug 2017 24:00:00 EDT

Take a look at this webcast to learn more about next-generation antivirus and how it can help boost your endpoint security with a number of benefits. Published by: Carbon Black



What is a Non-malware Attack?

Fri, 18 Aug 2017 24:00:00 EDT

Non-malware attacks leave a small footprint making them extremely hard to spot. Check out this 101 webcast to learn more about non-malware attacks and how you can protect yourself from them. Published by: Carbon Black



Ransomware Recovery Cases: Rebounding After an Attack and the Value of Data Backups

Tue, 22 Aug 2017 24:00:00 EDT

In this expert guide, learn how to verify the integrity of your backups in order to thwart, and recover from, potential ransomware attacks. Inside, our writers provide 4 case studies of organizations that were hit then executed a successful ransomware recovery, as well as vendors fighting on the front line of the outbreak. Published by: Commvault



The role of Apple device management in modern business

Fri, 18 Aug 2017 24:00:00 EDT

Many organizations rely on unified endpoint management for a variety of devices, but there's also a space for Apple device management in the modern enterprise. In this e-guide you'll discover new management support features for Apple devices and how they are making these devices more productive as business tools. Published by: JAMF



CW Nordics August 2017

Thu, 24 Aug 2017 24:00:00 EDT

The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more. Published by: ComputerWeekly.com



Why Digital Signing and Verification is Paramount in Cross Domain Environments

Tue, 22 Aug 2017 24:00:00 EDT

Malware targets USB keys and 1 out of every 8 attacks comes via USB. Watch this webcast to uncover how to protect your critical networks against recent portable media threats. Published by: OPSWAT inc



Manage Risk by Protecting the Apps and Data That Drive Business Productivity

Mon, 21 Aug 2017 24:00:00 EDT

Today you face the challenge of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent. See why customers around the globe rely on Citrix to help them address the growing cybersecurity threats of today while preparing for future requirements. Published by: Citrix



Computer Weekly – 22 August 2017: How banking technology has changed since the crash

Tue, 22 Aug 2017 24:00:00 EDT

In this week's Computer Weekly, 10 years after the financial crash, we examine how banking technology has changed. We look at how the EU's new data protection laws will affect storage strategies. And we ask if the cryptocurrency boom will remain a niche pursuit or can bring benefits for enterprise IT. Read the issue now. Published by: ComputerWeekly.com



How to Bolster Endpoint Security Protection

Fri, 11 Aug 2017 24:00:00 EDT

This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more. Published by: Symantec & Blue Coat Systems



Are Small Firms Ready for the GDPR?

Thu, 10 Aug 2017 24:00:00 EDT

A NetApp survey finds that smaller firms are not ready for the arrival of GDPR. This e-guide reveals the details of this survey and explores what these results mean for channel data specialists. Published by: Avnet



Why You Shouldn't Wait to Build a Data Governance Model

Mon, 14 Aug 2017 24:00:00 EDT

As your company amasses data from multiple sources, you can potentially lose control over data quality and accuracy. In this expert e-guide, learn why it's time to halt the data free-for-all and apply data governance to keep your organization on track. Published by: ERwin



Exploring Five GDPR Compliance Myths

Thu, 10 Aug 2017 24:00:00 EDT

The General Data Protection Regulation (GDPR) comes into force in May 2018, and there are a few misconceptions surrounding this legislation. This e-guide explores 5 common myths surrounding GDPR to help you prepare for the deadline. Published by: Avnet



Computer Weekly – 15 August 2017: Tech takes the lead in the Tour de France

Fri, 11 Aug 2017 24:00:00 EDT

When watching sports on television you are consistently confronted with a barrage of data, giving insight into the most complicated inner workings of football, tennis, cricket, etc., but never in cycling. Access this week's ComputerWeekly to learn how IoT is being introduced to the Tour de France and what that means for the viewer. Published by: ComputerWeekly.com



SME cyber security is increasingly a business imperative

Mon, 07 Aug 2017 24:00:00 EDT

A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business. Published by: ComputerWeekly.com



CW Benelux August 2017

Thu, 10 Aug 2017 24:00:00 EDT

The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today. Published by: ComputerWeekly.com



4 Tech Disruptors that Could Radically Change Security Operations

Tue, 01 Aug 2017 24:00:00 EDT

Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future. Published by: SearchSecurity.com