Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
application security  application  data  discover  email  enterprise  guide  learn  published veracode  published  security  veracode 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 20 Jan 2017 15:35:21 EST

Last Build Date: Fri, 20 Jan 2017 15:35:21 EST

 



The Smarter SMB’s Guide to Ransomware

Fri, 20 Jan 2017 24:00:00 EST

Gain valuable insight into how to prepare your organization's defense and disaster recovery policies for modern ransomware attacks. Take a closer look at how ransomware works as well as the most common variants that are active today. Published by: Barracuda Networks



Bonhams Standardizes U.S. IT With Red Hat Enterprise Virtualization

Tue, 31 Dec 2013 24:00:00 EST

Bonhams, an international auction house, needed to upgrade its IT within the United States needed a shared data center disaster recovery plan. Access this case study to learn how Bonhams was able to upgrade to a reliable, scalable, and cost-effective platform while cutting its software licensing in half and its servers down from 34 to 8. Published by: Red Hat



Make Your Enterprise Network a Top Priority for Hybrid IT

Fri, 30 Dec 2016 24:00:00 EST

In this white paper, discover new research that sheds light on the symbiotic relationship between hybrid IT and enterprise networks. Published by: Level 3 Communications, Inc.



5 Tips for Choosing a Next-GenerationEndpoint Security Solution

Fri, 20 Jan 2017 24:00:00 EST

Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape. Learn what should be covered, how, and common issues associated with choosing the one right for you. Published by: Cisco



Financial markets regulatory outlook 2017

Fri, 20 Jan 2017 24:00:00 EST

Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report. Published by: ComputerWeekly.com



Five Ways to Protect Your Digital Assets

Fri, 01 Jan 2016 24:00:00 EST

Discover the not only a rundown of the threats that you need to prepare for if disaster strikes, but also the backup and recovery strategies that will ensure business continues as normal as quickly as possible afterwards. Published by: Hewlett-Packard Enterprise



Security Everywhere: A Growth Engine for the Digital Economy

Thu, 19 Jan 2017 24:00:00 EST

Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE. Published by: Cisco



How Open Source Subscriptions Deliver Business Value

Fri, 30 Dec 2016 24:00:00 EST

Transferring to open source software (OSS) requires careful guidance to ensure security and maximize ROI during execution. Access this white paper to learn what to look for in an OSS vendor to guide your transition and see what one company offers as part of their customer experience. Published by: Red Hat



Cybersecurity as a Growth Advantage

Thu, 19 Jan 2017 24:00:00 EST

Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives. Published by: Cisco



Data Security for Small to Midsize Businesses

Mon, 30 May 2016 24:00:00 EDT

Learn how to counter the threats that are targeting your enterprise's data, productivity, revenue, and customers. Discover the questions that you need to ask yourself, such as do you have a pervasive security strategy? Are you ready for a mobile workforce? And more. Published by: Hewlett-Packard Enterprise



Cyber Security: How to Know What You Don't Know

Wed, 18 Jan 2017 24:00:00 EST

Learn how to figure out and mitigate your vulnerabilities so that your organization stays secure and your cyber security strategy keeps your data safe for whatever the future throws at it. Published by: Presidio Networked Solutions



2017 Will be an Exciting Year for IT

Sat, 31 Dec 2016 24:00:00 EST

See what this year will hold for cloud, IoT and business analytics, IT operations and DevOps, machine learning, and security. Read on to learn how cloud success depends on the village, the lines between digital and physical will continue to blur due to IoT, 2017 will be a big year for analytics, and more. Published by: Splunk



LISTEN TO YOUR DATA Profiles of Customer Success With the Splunk® Platform

Wed, 18 Jan 2017 24:00:00 EST

This e-book highlights a series of case studies that detail how a wide range of organizations have utilized the Splunk platform in real-world environments to solve problems, such as gain a better understand their digital audience, build a better business process, determine the highest value leads, and more. Published by: Splunk



Veracode Secure Development Survey

Tue, 17 Jan 2017 24:00:00 EST

Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more. Published by: Veracode, Inc.



State of Software Security: A Developer's Viewpoint

Tue, 17 Jan 2017 24:00:00 EST

Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more. Published by: Veracode, Inc.



3 Strategies to Keep Your Business Running Safely and Securely

Tue, 17 Jan 2017 24:00:00 EST

In this infographic, discover 3 IT strategies for keeping your data both secure and accessible to your employees. Published by: Hewlett-Packard Enterprise



Protecting Your Business in the Digital Transformation Journey

Mon, 29 Feb 2016 24:00:00 EST

As digital transformation shifts the risk landscape, IT security must change with it. In this white paper, discover the nature of this shit, as well as the role mobile devices play in modern security networks, how a BI program can help you build a comprehensive security program, successful strategies used by other mid-market companies, and more. Published by: Hewlett-Packard Enterprise



APT-Style Attacks: How Cybercriminals are Using Them

Thu, 12 Jan 2017 24:00:00 EST

New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks. Published by: WatchGuard Technologies, Inc.



Managed DNS Evaluation Guide: Understanding What Matters Most When Selecting Managed DNS

Wed, 30 Nov 2016 24:00:00 EST

This guide explains how a cloud-based DNS service can help you improve business results and provides guidelines for choosing a managed DNS service provider. Published by: Dyn



How to Build a Robust Application Security Governance Framework

Tue, 17 Jan 2017 24:00:00 EST

Discover not only how to simply, but also streamline application security. Learn how to ensure that everyone is in-sync, and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone. Published by: Veracode, Inc.



Application Security Beyond SAST and DAST

Mon, 16 Jan 2017 24:00:00 EST

Learn about trends in and the future of application security as it stands today and what organizations need to do to secure the most oft-attacked and breached layer of their products: the app layer. Published by: Veracode, Inc.



5 Lessons from an Application Security Pro

Mon, 16 Jan 2017 24:00:00 EST

Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches. Published by: Veracode, Inc.



Computer Weekly – 17 January 2017: RAC digitises roadside assistance

Mon, 16 Jan 2017 24:00:00 EST

In this week's issue, we find out how roadside assistance company RAC acquired a software company and deployed cloud-based telemetry to deliver internet-connected car technology for older vehicles. We also investigate the IT security risks associated with IoT and look at best practices in rolling out workplace collaboration. Published by: ComputerWeekly.com



Unified Insights on One Unified Threat Management Market Product

Fri, 13 Jan 2017 24:00:00 EST

This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more. Published by: WatchGuard Technologies, Inc.



Tackle Email Fraud with Comprehensive Targeted Threat Protection

Sat, 14 Jan 2017 24:00:00 EST

This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more. Published by: Mimecast



How to Seamlessly Integrate Security Into DevOps

Fri, 30 Sep 2016 24:00:00 EDT

Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments. Published by: Veracode, Inc.



The Benefits of Bug Bounty Programs and Security Code Testing

Fri, 13 Jan 2017 24:00:00 EST

In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats. Discover the pros and cons of "bug bounty" programs, the importance of code testing, and more. Published by: Veracode, Inc.



App Security Can’t Happen Without Developers

Fri, 13 Jan 2017 24:00:00 EST

In this report from Forrester learn how to use a combination of people and tools to deliver secure apps. Gain key takeaways such as mitigation costs skyrocket when security issues survive the development process, watching the OWASP Top 10 doesn't help when your app was attacked with No. 11, and more. Published by: Veracode, Inc.



Using Log Data Streams for Real-Time Analytics: 4 Common Use Cases

Fri, 13 Jan 2017 24:00:00 EST

Explore 4 use cases that exemplify why real-time analytics are critical to performance and user experience. Read on to learn how leveraging analytics to ensure continuous service delivery and uptime can be the keys to your enterprise's success. Published by: Logentries



Application Security Testing Vendor Evaluations

Thu, 06 Aug 2015 24:00:00 EDT

This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you. Published by: Veracode, Inc.



Five Tactics to Stop Email Attacks

Thu, 12 Jan 2017 24:00:00 EST

Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud. Published by: Mimecast



The Digital Certificate: How It Works, Which to Buy

Thu, 05 Jan 2017 24:00:00 EST

If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options. Published by: SearchSecurity.com



What are the Real Costs of the DIY ELK Stack?

Wed, 11 Jan 2017 24:00:00 EST

Learn some of the less well understood requirements of a robust DIY ELK Stack, the benefits and consequences of using the elastic stack for DIY logging, the costs compared to managed services, and more. Published by: Logentries



Technology, media and telecommunications predictions 2017

Wed, 11 Jan 2017 24:00:00 EST

Deloitte predicts the key trends in technology, media and telecommunications in 2017 Published by: ComputerWeekly.com



Smart Strategies To Protect Your Email From Phishing and CEO Fraud

Wed, 11 Jan 2017 24:00:00 EST

Join cybersecurity and info tech pros Howard Cohen and Orlando Scott-Cowley as they reveal how cybercriminals and employees alike increase the efficacy of phishing attacks, as well as strategies to prevent your email from these attacks. Published by: Mimecast



Resetting Your Email Security Strategy

Wed, 11 Jan 2017 24:00:00 EST

Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and 4 more. Published by: Mimecast



The 5 Rings of Data Integration Hell

Sat, 31 Dec 2016 24:00:00 EST

In this guide, discover the 5 "rings of hell" that make meeting data integration requirements difficult. In addition learn about the various scenarios which can cause data integration challenges, various methods for data migration worth considering, and more. Published by: Globalscape



Information Security magazine Insider Edition, January 2017

Tue, 10 Jan 2017 24:00:00 EST

Security for IoT requires a policy that includes a comprehensive list of devices that need attention and a system for regular IoT security testing. Published by: SearchSecurity.com



IT Security 101: Think Like A Cybercriminal

Tue, 10 Jan 2017 24:00:00 EST

In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the 6 key things to consider when assessing your IT security plan. Published by: Solarwinds MSP



Research Now Backup and Recovery Solution Study

Tue, 10 Jan 2017 24:00:00 EST

This resource provides information collected from a leading global research firm comparing satisfaction levels among four different backup and recovery solutions. Discover the top finisher in several key categories. Published by: Carbonite



7 Ways To Make Yourself Hard To Hack

Tue, 10 Jan 2017 24:00:00 EST

Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more. Published by: Solarwinds MSP



New Email-Borne Malware Campaign Highlights Danger Of Over Reliance On Sandboxes

Tue, 10 Jan 2017 24:00:00 EST

Today, new tools are able to convert potentially harmful read-only attachments into safe versions without being delayed by sandboxing. Learn more about tools that can ensure all original email attachments are sandboxed by an appropriately advanced email security gateway. Published by: Mimecast



How the Risks of Ransomware are Increasing in Impact to Organizations

Tue, 10 Jan 2017 24:00:00 EST

In this white paper, you'll learn how effective email security services can identify ransomware, prevent it from spreading, and restore data if the threat advances. Discover details on these three items. Published by: Mimecast



Focus: Securing for the future

Tue, 10 Jan 2017 24:00:00 EST

2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts. Published by: ComputerWeekly.com



Case Study: Chen Financial

Mon, 09 Jan 2017 24:00:00 EST

This case study outlines how a small financial planning firm was able to find a cloud backup solution that provided protection for their sensitive financial data. Published by: Carbonite



Nine Types of Cyber Threats and How to Stop Them

Mon, 09 Jan 2017 24:00:00 EST

Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more. Published by: Solarwinds MSP



Buyer's Guide to Identity and Access Management Solutions

Sun, 31 Jul 2016 24:00:00 EDT

Organizations now need "threat-aware" identity and access management (IAM) tools, and this buyer's guide can help you find the IAM solution that's right for your organization. Download now for checklists of key features in 5 main areas, and tips for selecting the solution that addresses all of your IAM needs. Published by: IBM



A CISO’s Guide to Mobile Threat Prevention

Mon, 09 Jan 2017 24:00:00 EST

Learn the five major threats to mobile security, how they can damage your enterprise, and what you can do to stop them. Published by: SingTel



Simplify Access Management With An Integrated Platform For Web and Cloud Computing

Mon, 09 Jan 2017 24:00:00 EST

In this white paper, discover how you can take back control of your access management with a single modular platform which monitors web, mobile, and cloud-based applications. Published by: IBM



Cybersecurity: Shift from a Position of Acknowledgement to Leadership

Fri, 06 Jan 2017 24:00:00 EST

Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization. Published by: SingTel