Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cloud  computer weekly  computerweekly  data  guide  learn  published computerweekly  published  security  siem  webcast  windows 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 23 Feb 2018 16:35:16 EST

Last Build Date: Fri, 23 Feb 2018 16:35:16 EST

 



Making GRC Understandable, Actionable, and Auditable for New Regulations

Wed, 21 Feb 2018 24:00:00 EST

TBD Published by: ServiceNow



Expanding the Threat Intelligence Horizon

Wed, 21 Feb 2018 24:00:00 EST

How is your organization defending and responding to threats? Explore this webcast to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies. Published by: Phantom Cyber



How to Prepare for Cyber Threats in 2018

Wed, 21 Feb 2018 24:00:00 EST

Network-propagating ransomware caused at least $5 billion in losses in 2017, according to Proofpoint. Explore this webcast to uncover a look back into 2017's cyber threats, 2018 threat predictions and top cybersecurity recommendations to protect your organization. Published by: Proofpoint, Inc.



Mobile security trends point to unifying policy and tools

Tue, 20 Feb 2018 24:00:00 EST

Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management. Published by: SearchSecurity.com



Protecting Your Sensitive Data

Wed, 14 Feb 2018 24:00:00 EST

Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud. Published by: Symantec



Disaster recovery in the age of cloud

Tue, 20 Feb 2018 24:00:00 EST

The cloud is emerging as a key option for disaster recovery. Its benefits include reduced costs and taking advantage of the provider's skills when you may not have them in-house. But when is it best to go cloud for DR? That's one of the key decision points we address in this e-guide. Published by: ComputerWeekly.com



The Future of Privileged Management

Wed, 14 Feb 2018 24:00:00 EST

The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts. Published by: One Identity



CW Nordics ezine February 2018

Thu, 22 Feb 2018 24:00:00 EST

In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs. Published by: ComputerWeekly.com



Regulating Privileged Access: When to Require Human Approval Workflows

Wed, 14 Feb 2018 24:00:00 EST

Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity. Published by: One Identity



Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

Wed, 14 Feb 2018 24:00:00 EST

In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights. Published by: One Identity



Protect Against Zero Day Threats and Malware

Mon, 12 Feb 2018 24:01:42 EST

Watch this brief video to learn how this browser-as-a-service can help you defend against malware that gets in through unsecured web browsing. Published by: Citrix



Identity Analytics – A more Collective Defense

Wed, 14 Feb 2018 24:00:00 EST

As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task. Published by: One Identity



ASEAN IT Priorities 2018

Mon, 19 Feb 2018 24:00:00 EST

This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure. Published by: ComputerWeekly.com



Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

Fri, 16 Feb 2018 24:00:00 EST

In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now. Published by: ComputerWeekly.com



Employee & Device Monitoring: Dispelling the Myths

Mon, 12 Feb 2018 01:00:59 EST

Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program. Published by: Forcepoint



Forcepoint CASB: Visibility and Control of Cloud Applications

Mon, 12 Feb 2018 24:33:19 EST

Watch this webcast to learn about 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they can provide. Published by: Forcepoint



How to Maintain Control of Documents and Files Shared with Others

Mon, 12 Feb 2018 24:00:00 EST

Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more. Published by: Citrix



ANZ IT Priorities 2018

Fri, 16 Feb 2018 24:00:00 EST

The IT Priorities 2018 survey results underscore what we already know about the ANZ IT landscape - more investments in software and cloud services to buttress digital transformation efforts, including the greater use of artificial intelligence, machine learning and robotics. But there were a few surprises as well Published by: ComputerWeekly.com



Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive

Tue, 05 Dec 2017 24:53:40 EST

This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards. Published by: Splunk



What to Know about SIEM as a Service

Tue, 06 Feb 2018 24:00:00 EST

Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach. Published by: LogRhythm, Inc.



User Behavior Analysis & SIEM

Wed, 07 Feb 2018 24:00:00 EST

In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis. Published by: LogRhythm, Inc.



How to Improve SIEM Systems with Machine Learning

Wed, 07 Feb 2018 24:00:00 EST

In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems. Published by: LogRhythm, Inc.



Crafting a Cybersecurity Incident Response Plan, Step by Step

Tue, 13 Feb 2018 24:00:00 EST

Is your cybersecurity incident response plan the best it can be? Inside this expert handbook, Johna Till Johnson, Rob Shapland and Mike Villegas uncover step by step instructions to crafting an effective incident response plan and cloud incident response plan for your organization. Published by: SearchSecurity.com



Computer Weekly – 13 February 2018: On the path to diversity in tech

Fri, 09 Feb 2018 24:00:00 EST

In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now. Published by: ComputerWeekly.com



Creating a High-Availability Strategy to Prevent System Failure

Mon, 05 Feb 2018 24:00:00 EST

Read this expert-guide to learn how you can instate a high-availability policy in your enterprise. You'll start by learning what makes high-availability so unique and enticing, and then go on to find some tips on how you can make it a reality in your own business. Published by: arcserve



Arcserve Unified Data Protection Cuts Downtime for Cloud DR

Mon, 05 Feb 2018 24:00:00 EST

In this expert-guide, learn about Arcserve's new Unified Data Protection system, which the claim delivers a five-minute recovery time objective and 15-minute recover point objective for data, and figure out if this service is fast enough for you. Published by: arcserve



CW ASEAN – February 2018: European data law: be aware and prepare

Thu, 08 Feb 2018 24:00:00 EST

Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses. Published by: ComputerWeekly.com



CW ANZ – February 2018: Prepare for EU data law

Thu, 08 Feb 2018 24:00:00 EST

Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws. Published by: ComputerWeekly.com



The next wave of IoT in Asia: What to expect in 2018

Thu, 08 Feb 2018 24:00:00 EST

In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions. Published by: ComputerWeekly.com



Computer Weekly Buyer's Guide to EU General Data Protection Regulation

Wed, 07 Feb 2018 24:00:00 EST

In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules. Published by: ComputerWeekly.com



Five Milestones to GDPR Success

Tue, 06 Feb 2018 24:00:00 EST

The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant. Published by: Proofpoint, Inc.



Fully Managed Microsoft Azure Includes Security Services

Wed, 22 Mar 2017 24:00:00 EDT

Click inside to discover a cloud provider that will help you protect your Azure environments. Read on to learn how they can help to extend your Azure Active Directory IAM system beyond its normal limits, remediate breaches immediately with pre-approved actions, and more. Published by: Rackspace



CW Benelux February 2018

Thu, 01 Feb 2018 24:00:00 EST

In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities. Published by: ComputerWeekly.com



CISOs Map Out Their 2018 Cybersecurity Plans

Thu, 01 Feb 2018 24:00:00 EST

As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans. Published by: SearchSecurity.com



Endpoint Protection & Device Management

Wed, 24 Jan 2018 24:00:00 EST

The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices. Published by: Seqrite



End-User Security Survey: How Common is Confidential File Sharing?

Fri, 29 Dec 2017 24:00:00 EST

To find out how widespread the unsafe sharing of confidential data has become, Dell commissioned a global survey of 2,608 professionals who handle confidential data at companies with 250 or more employees. Click inside to learn the results. Published by: Dell and Intel



Computer Weekly – 30 January 2018: Davos debates global tech risks

Thu, 25 Jan 2018 24:00:00 EST

In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now. Published by: ComputerWeekly.com



Detect Unknown Threats, Reduce Dwell Time, And Accelerate Response

Thu, 30 Nov 2017 24:00:00 EST

Click inside to learn about an endpoint detection and response tool that can help you detect complex attacks. This system offers continual monitoring and analysis of user behavior in your endpoints, and more. Published by: Dell and Intel



5 Overlooked Windows 10 Security Risks

Mon, 05 Feb 2018 24:00:00 EST

Windows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook. Published by: VMware



Five Keys to Keep Windows 10 Strong

Mon, 05 Feb 2018 24:00:00 EST

It takes continuous work to ensure that your Windows 10 deployment is as effective as it can be. By instilling a few key habits in your IT team, you can improve your user's experience. With this exclusive guide, complete with a quiz on Windows 10 features, you can improve security power, operational efficiency, and take full advantage of W10. Published by: VMware



18 Windows 10 Facts IT Must Know

Mon, 05 Feb 2018 24:00:00 EST

Now that Windows 10 has gone through some ups and downs, and has seen a fourth significant upgrade, it is time to see what we know about Windows 10 as it stands right now. Published by: VMware