Subscribe: Most Popular White Papers and WebcastsSecurity Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
application security  application  cloud  data  digital  discover  email  learn  published veracode  published  security  veracode 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Thu, 19 Jan 2017 14:35:27 EST

Last Build Date: Thu, 19 Jan 2017 14:35:27 EST


Five Ways to Protect Your Digital Assets

Fri, 01 Jan 2016 24:00:00 EST

Discover the not only a rundown of the threats that you need to prepare for if disaster strikes, but also the backup and recovery strategies that will ensure business continues as normal as quickly as possible afterwards. Published by: Hewlett-Packard Enterprise

Security Everywhere: A Growth Engine for the Digital Economy

Thu, 19 Jan 2017 24:00:00 EST

Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE. Published by: Cisco

How Open Source Subscriptions Deliver Business Value

Fri, 30 Dec 2016 24:00:00 EST

Transferring to open source software (OSS) requires careful guidance to ensure security and maximize ROI during execution. Access this white paper to learn what to look for in an OSS vendor to guide your transition and see what one company offers as part of their customer experience. Published by: Red Hat

Cybersecurity as a Growth Advantage

Thu, 19 Jan 2017 24:00:00 EST

Learn why the belief that the primary purpose of cybersecurity is growth enablement is taking hold among senior finance and line-of-business executives. Published by: Cisco

Data Security for Small to Midsize Businesses

Mon, 30 May 2016 24:00:00 EDT

Learn how to counter the threats that are targeting your enterprise's data, productivity, revenue, and customers. Discover the questions that you need to ask yourself, such as do you have a pervasive security strategy? Are you ready for a mobile workforce? And more. Published by: Hewlett-Packard Enterprise

Cyber Security: How to Know What You Don't Know

Wed, 18 Jan 2017 24:00:00 EST

Learn how to figure out and mitigate your vulnerabilities so that your organization stays secure and your cyber security strategy keeps your data safe for whatever the future throws at it. Published by: Presidio Networked Solutions

2017 Will be an Exciting Year for IT

Sat, 31 Dec 2016 24:00:00 EST

See what this year will hold for cloud, IoT and business analytics, IT operations and DevOps, machine learning, and security. Read on to learn how cloud success depends on the village, the lines between digital and physical will continue to blur due to IoT, 2017 will be a big year for analytics, and more. Published by: Splunk

LISTEN TO YOUR DATA Profiles of Customer Success With the Splunk® Platform

Wed, 18 Jan 2017 24:00:00 EST

This e-book highlights a series of case studies that detail how a wide range of organizations have utilized the Splunk platform in real-world environments to solve problems, such as gain a better understand their digital audience, build a better business process, determine the highest value leads, and more. Published by: Splunk

Veracode Secure Development Survey

Tue, 17 Jan 2017 24:00:00 EST

Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more. Published by: Veracode, Inc.

State of Software Security Heading into 2017: Application Security

Tue, 17 Jan 2017 24:00:00 EST

Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Access now to solid insights into app security such as security features being applied incorrectly, component vulnerability dangers, and more. Published by: Veracode, Inc.

3 Strategies to Keep Your Business Running Safely and Securely

Tue, 17 Jan 2017 24:00:00 EST

In this infographic, discover 3 IT strategies for keeping your data both secure and accessible to your employees. Published by: Hewlett-Packard Enterprise

Protecting Your Business in the Digital Transformation Journey

Mon, 29 Feb 2016 24:00:00 EST

As digital transformation shifts the risk landscape, IT security must change with it. In this white paper, discover the nature of this shit, as well as the role mobile devices play in modern security networks, how a BI program can help you build a comprehensive security program, successful strategies used by other mid-market companies, and more. Published by: Hewlett-Packard Enterprise

APT-Style Attacks: How Cybercriminals are Using Them

Thu, 12 Jan 2017 24:00:00 EST

New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks. Published by: WatchGuard Technologies, Inc.

How to Build a Robust Application Security Governance Framework

Tue, 17 Jan 2017 24:00:00 EST

Discover not only how to simply, but also streamline application security. Learn how to ensure that everyone is in-sync, and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone. Published by: Veracode, Inc.

Ansible Tower Demo: The Case for IT Orchestration

Mon, 16 Jan 2017 24:00:00 EST

Do you have a framework for automating IT systems? Learn how to integrate Ansible Tower orchestration and IT configuration with your own Linux server or cloud instance. Download now to see if agentless IT automation is right for your organization's app infrastructure. Published by: Red Hat

Application Security Beyond SAST and DAST

Mon, 16 Jan 2017 24:00:00 EST

Learn about trends in and the future of application security as it stands today and what organizations need to do to secure the most oft-attacked and breached layer of their products: the app layer. Published by: Veracode, Inc.

5 Lessons from an Application Security Pro

Mon, 16 Jan 2017 24:00:00 EST

Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches. Published by: Veracode, Inc.

Computer Weekly – 17 January 2017: RAC digitises roadside assistance

Mon, 16 Jan 2017 24:00:00 EST

In this week's issue, we find out how roadside assistance company RAC acquired a software company and deployed cloud-based telemetry to deliver internet-connected car technology for older vehicles. We also investigate the IT security risks associated with IoT and look at best practices in rolling out workplace collaboration. Published by:

Unified Insights on One Unified Threat Management Market Product

Fri, 13 Jan 2017 24:00:00 EST

This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more. Published by: WatchGuard Technologies, Inc.

Tackle Email Fraud with Comprehensive Targeted Threat Protection

Sat, 14 Jan 2017 24:00:00 EST

This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more. Published by: Mimecast

How to Seamlessly Integrate Security Into DevOps

Fri, 30 Sep 2016 24:00:00 EDT

Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments. Published by: Veracode, Inc.

The Benefits of Bug Bounty Programs and Security Code Testing

Fri, 13 Jan 2017 24:00:00 EST

In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats. Discover the pros and cons of "bug bounty" programs, the importance of code testing, and more. Published by: Veracode, Inc.

App Security Can’t Happen Without Developers

Fri, 13 Jan 2017 24:00:00 EST

In this report from Forrester learn how to use a combination of people and tools to deliver secure apps. Gain key takeaways such as mitigation costs skyrocket when security issues survive the development process, watching the OWASP Top 10 doesn't help when your app was attacked with No. 11, and more. Published by: Veracode, Inc.

Using Log Data Streams for Real-Time Analytics: 4 Common Use Cases

Fri, 13 Jan 2017 24:00:00 EST

Explore 4 use cases that exemplify why real-time analytics are critical to performance and user experience. Read on to learn how leveraging analytics to ensure continuous service delivery and uptime can be the keys to your enterprise's success. Published by: Logentries

Global Risks Report 2017

Fri, 13 Jan 2017 24:00:00 EST

Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals Published by:

Application Security Testing Vendor Evaluations

Thu, 06 Aug 2015 24:00:00 EDT

This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you. Published by: Veracode, Inc.

Automating Cloud Infrastructure with Ansible IT Engine

Thu, 12 Jan 2017 24:00:00 EST

Examine how Splunk accelerated IT provisioning, configuration, and task management within its cloud infrastructure with an automation engine that rapidly deploys and scale server clusters and apps, configures the cloud on-demand, and autoscales infrastructure as needed. Published by: Red Hat

Five Tactics to Stop Email Attacks

Thu, 12 Jan 2017 24:00:00 EST

Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud. Published by: Mimecast

The Digital Certificate: How It Works, Which to Buy

Thu, 05 Jan 2017 24:00:00 EST

If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options. Published by:

What are the Real Costs of the DIY ELK Stack?

Wed, 11 Jan 2017 24:00:00 EST

Learn some of the less well understood requirements of a robust DIY ELK Stack, the benefits and consequences of using the elastic stack for DIY logging, the costs compared to managed services, and more. Published by: Logentries

Technology, media and telecommunications predictions 2017

Wed, 11 Jan 2017 24:00:00 EST

Deloitte predicts the key trends in technology, media and telecommunications in 2017 Published by:

Smart Strategies To Protect Your Email From Phishing and CEO Fraud

Wed, 11 Jan 2017 24:00:00 EST

Join cybersecurity and info tech pros Howard Cohen and Orlando Scott-Cowley as they reveal how cybercriminals and employees alike increase the efficacy of phishing attacks, as well as strategies to prevent your email from these attacks. Published by: Mimecast

Resetting Your Email Security Strategy

Wed, 11 Jan 2017 24:00:00 EST

Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and 4 more. Published by: Mimecast

The 5 Rings of Data Integration Hell

Sat, 31 Dec 2016 24:00:00 EST

In this guide, discover the 5 "rings of hell" that make meeting data integration requirements difficult. In addition learn about the various scenarios which can cause data integration challenges, various methods for data migration worth considering, and more. Published by: Globalscape

Information Security magazine Insider Edition, January 2017

Tue, 10 Jan 2017 24:00:00 EST

Security for IoT requires a policy that includes a comprehensive list of devices that need attention and a system for regular IoT security testing. Published by:

IT Security 101: Think Like A Cybercriminal

Tue, 10 Jan 2017 24:00:00 EST

In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the 6 key things to consider when assessing your IT security plan. Published by: Solarwinds MSP

Research Now Backup and Recovery Solution Study

Tue, 10 Jan 2017 24:00:00 EST

This resource provides information collected from a leading global research firm comparing satisfaction levels among four different backup and recovery solutions. Discover the top finisher in several key categories. Published by: Carbonite

Adapt Your Infosec Program for Advanced Threats

Tue, 10 Jan 2017 01:09:00 EST

In our just-launched guide, How to Evolve Your Infosec Program for Emerging Threats, security expert Nick Lewis explains how to update and evolve these programs, and then reveals what enterprises need to know about APT-style attacks. Published by: TechTarget

7 Ways To Make Yourself Hard To Hack

Tue, 10 Jan 2017 24:00:00 EST

Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more. Published by: Solarwinds MSP

New Email-Borne Malware Campaign Highlights Danger Of Over Reliance On Sandboxes

Tue, 10 Jan 2017 24:00:00 EST

Today, new tools are able to convert potentially harmful read-only attachments into safe versions without being delayed by sandboxing. Learn more about tools that can ensure all original email attachments are sandboxed by an appropriately advanced email security gateway. Published by: Mimecast

How the Risks of Ransomware are Increasing in Impact to Organizations

Tue, 10 Jan 2017 24:00:00 EST

In this white paper, you'll learn how effective email security services can identify ransomware, prevent it from spreading, and restore data if the threat advances. Discover details on these three items. Published by: Mimecast

Focus: Securing for the future

Tue, 10 Jan 2017 24:00:00 EST

2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts. Published by:

Case Study: Chen Financial

Mon, 09 Jan 2017 24:00:00 EST

This case study outlines how a small financial planning firm was able to find a cloud backup solution that provided protection for their sensitive financial data. Published by: Carbonite

Nine Types of Cyber Threats and How to Stop Them

Mon, 09 Jan 2017 24:00:00 EST

Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more. Published by: Solarwinds MSP

Buyer's Guide to Identity and Access Management Solutions

Sun, 31 Jul 2016 24:00:00 EDT

Organizations now need "threat-aware" identity and access management (IAM) tools, and this buyer's guide can help you find the IAM solution that's right for your organization. Download now for checklists of key features in 5 main areas, and tips for selecting the solution that addresses all of your IAM needs. Published by: IBM

A CISO’s Guide to Mobile Threat Prevention

Mon, 09 Jan 2017 24:00:00 EST

Learn the five major threats to mobile security, how they can damage your enterprise, and what you can do to stop them. Published by: SingTel

Simplify Access Management With An Integrated Platform For Web and Cloud Computing

Mon, 09 Jan 2017 24:00:00 EST

In this white paper, discover how you can take back control of your access management with a single modular platform which monitors web, mobile, and cloud-based applications. Published by: IBM

Cybersecurity: Shift from a Position of Acknowledgement to Leadership

Fri, 06 Jan 2017 24:00:00 EST

Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization. Published by: SingTel

The Ideal Combination of Convenience and Productivity

Fri, 30 Dec 2016 24:00:00 EST

Knowledge is indeed power, but only if you can share it quickly and securely with others in their preferred format. Learn how you can leverage a multifunction copier to enable you to distribute your important information in multiple formats without putting security at risk. Published by: Ricoh- Techdata

Protecting your organisation from itself

Fri, 06 Jan 2017 24:00:00 EST

This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation. Published by: