Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cloud  data  expert guide  expert  gdpr  guide learn  guide  learn  protection  published computerweekly  published  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Wed, 20 Sep 2017 16:05:18 EDT

Last Build Date: Wed, 20 Sep 2017 16:05:18 EDT

 



Managing access to keep privileged users' credentials secure

Wed, 20 Sep 2017 24:00:00 EDT

Privilege creep arises in many ways, which is one reason privileged user management should top the infosec team's to-do list. Published by: SearchSecurity.com



Why Security in DevOps is Essential to Software Development

Tue, 19 Sep 2017 24:00:00 EDT

What is the point of releasing new software that's loaded up with security vulnerabilities? Take a closer look at this handbook to reveal how IT professionals can fit security into their development process and how they will benefit from doing so. Published by: SearchSecurity.com



Guide to Early Application Testing and Understanding Dev and Ops Responsibilities

Tue, 19 Sep 2017 24:00:00 EDT

Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices. Published by: IBM



How to Think like a Hacker to Stop Application Security Threats

Tue, 19 Sep 2017 24:00:00 EDT

Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize. Published by: IBM



How to Increase Security for your Login on Mobile Applications

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data. Published by: IBM



How to Secure Mobile Applications in a Private Cloud

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications. Published by: IBM



How to Boost Mobile Application Security

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks. Published by: IBM



How to Build an Enterprise Application Security Program

Mon, 18 Sep 2017 24:00:00 EDT

In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing. Published by: IBM



Single sign-on service requires a cloud-era update

Wed, 13 Sep 2017 24:00:00 EDT

The best SSO for enterprise use must tackle the complexities that mobility and cloud services like identity as a service present. Published by: SearchSecurity.com



Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

Wed, 13 Sep 2017 24:00:00 EDT

This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption. Published by: ComputerWeekly.com



Focus: Datacentre Uptime

Tue, 12 Sep 2017 24:00:00 EDT

In this e-guide, we take a closer look at some high-profile datacentre outages of recent times and assess the toll they took on the companies involved, and look into what providers and consumers can do to protect themselves from downtime. Published by: ComputerWeekly.com



Get Your Company GDPR-Ready: Research Study Results

Wed, 06 Sep 2017 01:01:45 EDT

The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more. Published by: CA Technologies.



Insuring the uninsurable: Is cyber insurance worth its salt?

Tue, 12 Sep 2017 24:00:00 EDT

This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions. Published by: ComputerWeekly.com



GDPR: The State of Play

Mon, 11 Sep 2017 24:00:00 EDT

An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play. Published by: ComputerWeekly.com



Ready, Set, Go: General Data Protection Regulation (GDPR)

Wed, 06 Sep 2017 24:00:00 EDT

With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival. Published by: CA Technologies.



What Does The GDPR Mean To You? How To Improve Your Testing And Keep Your Test Data Compliant

Wed, 06 Sep 2017 24:41:35 EDT

Data breaches are almost an everyday event – but the upcoming General Data Protection Regulation (GDPR) forces you to think differently about data breaches and how they impact your software development and testing process. Learn what you can do to avoid compromising your test data, and how CA Test Data Manager can help. Published by: CA Technologies.



CW Europe – September-November 2017

Thu, 07 Sep 2017 24:00:00 EDT

In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years. Published by: ComputerWeekly.com



Getting Ready for the EU General Data Protection Regulation

Wed, 13 Sep 2017 24:00:00 EDT

The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR. Published by: Ivanti



Druva Phoenix Rises as Disaster Recovery Service

Fri, 01 Sep 2017 24:00:00 EDT

Click inside to learn how, by teaming up with AWS Druva is offering their customers disaster recovery-as-a-service for the first time ever. Published by: Druva Software



Understanding your Full Public Key Infrastructure (PKI) Potential

Thu, 31 Aug 2017 24:00:00 EDT

This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security. Published by: DigiCert



IT Security Trends to Know

Tue, 29 Aug 2017 24:00:00 EDT

The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts. Published by: Cisco Umbrella



EU GDPR Compliance Puts Focus on Data Tracking, Encryption

Thu, 31 Aug 2017 24:00:00 EDT

In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance. Published by: Ivanti



How has 2017 Changed the Data Protection Landscape?

Wed, 30 Aug 2017 24:00:00 EDT

In this e-guide, read an interview with Commvault CEO Bob Hammer, and learn what this industry expert thinks about how factors like ransomware and GDPR prep are changing the backup market. Then, explore how Commvault's backup system combines innovation with tradition to provide 365 degree protection. Published by: Commvault



Basic SIEM Analytics Steps to Know

Sat, 02 Sep 2017 24:00:00 EDT

All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Inside this guide, experts Karen Scarfone and Johna Johnson reveal tips on how to filter through data securely and catch threats before they harm your organization. Published by: TechTarget



Information Security Certifications

Sat, 02 Sep 2017 24:00:00 EDT

There are only 3 easy steps to follow when choosing which security certification to pursue. Find out what they are in are in our information security certifications expert guide. You'll explore many vendor-specific, as well as vendor-neutral, security-related certification programs that occupy this landscape and find out which one is right for you. Published by: TechTarget



Web Security: Now What?

Fri, 01 Sep 2017 24:00:00 EDT

In this handbook, experts dive into the ongoing issues related to TLS security and HTTPS inspection. Uncover more about the journey of computer worms and how they play a role in advanced persistent threats. Published by: SearchSecurity.com



Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

Tue, 29 Aug 2017 24:00:00 EDT

Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic. Published by: Cisco Umbrella



Owner-controlled PKI: The Next Step in Securing IoT

Fri, 01 Sep 2017 24:00:00 EDT

Learn how owner-operated PKI is making strides in becoming the most secure option for IoT users. Published by: DigiCert



The Evolution from Two-Factor Authentication to Identity Assurance

Tue, 29 Aug 2017 24:00:00 EDT

Identity is today's most consequential attack vector, with 81% of confirmed data breaches involving weak, default or stolen passwords. Learn about how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance. Published by: RSA



Improve Endpoint Security with Advanced Tools and Techniques

Tue, 29 Aug 2017 24:00:00 EDT

Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection. Published by: OPSWAT inc



Add-ons Secure Office 365 from Advanced Attacks

Wed, 30 Aug 2017 24:00:00 EDT

Microsoft has added new features to secure Office 365 against advanced threats, such as email phishing attempts and malicious attachments. In this expert e-guide, learn more about the new layers of protection. Published by: OPSWAT inc



How Should Companies Across the Globe Prepare for EU GDPR Compliance?

Mon, 21 Aug 2017 24:00:00 EDT

As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance Published by: Commvault



How Secure is Open Source Software?

Thu, 24 Aug 2017 24:00:00 EDT

In this expert e-guide, learn about open source security requirements to consider and who should be responsible for security and support. Discover how to keep track of open source software for licensing and security purposes. Published by: Flexera Software



Government IT strategy & challenges in Australia

Wed, 30 Aug 2017 24:00:00 EDT

In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks. Published by: ComputerWeekly.com



How to Find the Best DDoS Attack Prevention and Dection Tools

Tue, 29 Aug 2017 24:00:00 EDT

Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you. Published by: SearchSecurity.com



How ServiceChannel Automated Their AWS Environment with Puppet

Tue, 08 Aug 2017 24:00:00 EDT

ServiceChannel, a small SaaS provider based in New York City, lost their entire data center during Hurricane Sandy. Making their repairs, they needed a way to migrate to AWS Cloud efficiently. Access this webinar for information on the tool they used to automate their AWS environment. Published by: Puppet



How mobile and IoT connectivity is shaping the network of the future

Mon, 28 Aug 2017 24:00:00 EDT

In this e-guide, read about the concept of autonomous self-driving networks, how the IoT connectivity wars are playing out and why Asia is set to dominate industry conversations on 5G. Published by: ComputerWeekly.com



Mastering Both Legacy and Cloud Disaster Recovery

Tue, 22 Aug 2017 24:00:00 EDT

As the definition of "disaster" has expanded, DR budgets have stayed the same. In this e-guide, learn what cloud-based disaster recovery can offer you in this new climate, and find 3-step instruction to help you develop a cloud DR plan. Then, take a deeper look at the difference between legacy and cloud-based disaster-recover-as-a-service. Published by: Commvault



What You Should Know Before Adopting Cloud Backup

Tue, 22 Aug 2017 24:00:00 EDT

Read on to learn what you can do to make cloud backups even more secure, by employing the Triple Data Encryption Standard, tightening access control, and more. Then, discover the 5 questions you need to ask providers before backing up your data to the cloud. Published by: Commvault



Cloud, NoSQL, or Other; Which Backup System Is Right for You?

Tue, 22 Aug 2017 24:00:00 EDT

In this e-guide, learn about a cloud-based backup system that strikes a balance between protecting older applications, and paving the way for new innovation. Afterwards, read on to explore a myriad of data backup software options, from NoSQL to the cloud, and discover which platform is right for your organization. Published by: Commvault



Endpoint 101: How Do Different Types of Antivirus Work?

Fri, 18 Aug 2017 24:00:00 EDT

Take a look at this quick 101 endpoint security webcast to learn more about antivirus approaches and their strategies to enhance your endpoint security. Published by: Carbon Black



What is next-generation antivirus, or NGAV?

Fri, 18 Aug 2017 24:00:00 EDT

Take a look at this webcast to learn more about next-generation antivirus and how it can help boost your endpoint security with a number of benefits. Published by: Carbon Black



What is a Non-malware Attack?

Fri, 18 Aug 2017 24:00:00 EDT

Non-malware attacks leave a small footprint making them extremely hard to spot. Check out this 101 webcast to learn more about non-malware attacks and how you can protect yourself from them. Published by: Carbon Black



Ransomware Recovery Cases: Rebounding After an Attack and the Value of Data Backups

Tue, 22 Aug 2017 24:00:00 EDT

In this expert guide, learn how to verify the integrity of your backups in order to thwart, and recover from, potential ransomware attacks. Inside, our writers provide 4 case studies of organizations that were hit then executed a successful ransomware recovery, as well as vendors fighting on the front line of the outbreak. Published by: Commvault



CW Nordics August 2017

Thu, 24 Aug 2017 24:00:00 EDT

The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more. Published by: ComputerWeekly.com



Why Digital Signing and Verification is Paramount in Cross Domain Environments

Tue, 22 Aug 2017 24:00:00 EDT

Malware targets USB keys and 1 out of every 8 attacks comes via USB. Watch this webcast to uncover how to protect your critical networks against recent portable media threats. Published by: OPSWAT inc



Disaster recovery methods: Legacy DR vs. the cloud

Fri, 15 Sep 2017 24:00:00 EDT

When it comes to choosing a disaster recovery method, there's a lot to consider. Cost, RTO and expertise are all important factors to take into account. Download this e-guide to compare legacy DR vs. the cloud and decide which is best for your organization. Published by: Colospace Inc.



Logrythm's Security Analytics Platform: Product Overview

Thu, 14 Sep 2017 24:00:00 EDT

In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment. Published by: LogRhythm, Inc.



SIEM Analysis for Security Professionals

Thu, 14 Sep 2017 24:00:00 EDT

This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise. Published by: LogRhythm, Inc.



Step Up Your Security and Privacy with Data Masking

Mon, 28 Aug 2017 24:48:04 EDT

For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more. Published by: Delphix