Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
access  computerweekly  data  ddos  guide  iot  learn  network  published computerweekly  published  read  security  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 24 Nov 2017 05:10:13 EST

Last Build Date: Fri, 24 Nov 2017 05:10:13 EST

 



Web security: Important but often overlooked

Fri, 24 Nov 2017 24:00:00 EST

In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls. Published by: ComputerWeekly.com



Gamma International: The Macedonia files - Source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

Thu, 23 Nov 2017 24:00:00 EST

This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia. Published by: ComputerWeekly.com



Introducing the Delphix Dynamic Data Platform

Wed, 15 Nov 2017 24:00:00 EST

In this webcast, hear from Patrick Lightbody of Delphix, about the need to rethink the approach to data management and access to data, which will require significant changes among people and processes. Published by: Delphix



EU General Data Protection Regulation with MarkLogic

Wed, 15 Nov 2017 24:00:00 EST

This webcast covers the importance of understanding the GDPR, and the steps to take to achieve and manage compliance, with the use of a database that integrates data better, faster, with less cost. Listen in to learn about the steps your organization should take to ensure compliance, and how you stay on top of the process along the way. Published by: MarkLogic



CIOs Discuss Digital Transformation

Wed, 15 Nov 2017 24:00:00 EST

Learn from CIOs about their top challenges to meet today's data demands as the need for digital transformation accelerates. Published by: Delphix



Step Up Your Security and Privacy with Data Masking

Wed, 15 Nov 2017 24:00:00 EST

With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is not an easy task, especially with new mandates like GDPR and HIPAA. This webcast explores how you can use data masking to keep data protected. Published by: Delphix



How Can Privileged Access Accounts Be Managed in Large Companies?

Mon, 13 Nov 2017 24:00:00 EST

According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access. Published by: One Identity



How can organizations get control over privileged identity management?

Tue, 14 Nov 2017 24:00:00 EST

Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information Published by: One Identity



Essential Guide: What the EU Data Protection Regulation changes mean to you

Mon, 20 Nov 2017 24:00:00 EST

This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation. Published by: ComputerWeekly.com



Computer Weekly – 21 November 2017: What can intent-based networking do for you?

Fri, 17 Nov 2017 24:00:00 EST

In this week's Computer Weekly, intent-based networking promises to optimise networks through automation and analytics, but can it deliver? Gartner says the CIO role continues to evolve and IT leaders need to champion digital change – we examine the issues. And we find out how security analytics can help deal with cyber threats. Read the issue now. Published by: ComputerWeekly.com



Essential Guide: Securing hybrid IT infrastructure

Thu, 16 Nov 2017 24:00:00 EST

In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud. Published by: ComputerWeekly.com



Payer's Place in the Healthcare Ecosystem Keys to Success

Thu, 02 Nov 2017 24:00:00 EDT

Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value. Published by: HealthEdge



CW ASEAN – November 2017: How managed security services help to reduce cyber risk

Fri, 10 Nov 2017 24:00:00 EST

In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of. Published by: ComputerWeekly.com



CW ANZ – November 2017: On cyber alert

Fri, 10 Nov 2017 24:00:00 EST

In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security. Published by: ComputerWeekly.com



Real- World Examples: ROI- Results

Thu, 02 Nov 2017 24:00:00 EDT

Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more. Published by: HealthEdge



Fintech & the digital customer experience

Thu, 09 Nov 2017 24:00:00 EST

In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years. Published by: ComputerWeekly.com



How Australian organisations are coping with big data storage challenges

Mon, 06 Nov 2017 24:00:00 EST

In this e-guide, read about how Australian organisations are coping with the storage challenges of big data, why flash storage is still too expensive for some companies and how NetApp is evolving to keep up with changes in the industry. Published by: ComputerWeekly.com



Choosing the right DRaaS provider

Fri, 03 Nov 2017 24:00:00 EDT

'Storage' magazine examines how to screen disaster recovery-as-a-service providers, as well as evolving cold data storage and file sync-and-share offerings. Published by: SearchStorage.com



CW Benelux November 2017

Thu, 09 Nov 2017 24:00:00 EST

The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up. Published by: ComputerWeekly.com



A New Call for Alignment Between Business Needs and Enterprise Networks

Thu, 02 Nov 2017 24:00:00 EDT

In this issue of Network Evolution e-zine, we learn how more comprehensive IT-business strategic alignment would aid network managers. We focus on 3 key areas: hardware management, UC, and network security. Published by: SearchNetworking.com



The Case for Modern SOCs

Thu, 02 Nov 2017 24:00:00 EDT

In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more. Published by: SearchSecurity.com



IoT Privacy and Security

Thu, 02 Nov 2017 24:00:00 EDT

Learn more about IoT attacks that could be threatening your enterprise by taking our Endpoint Security Survey and downloading our expert guide: IoT Privacy and Security. As a bonus for participating, claim a DevSecOps resource upon completion. Published by: TechTarget



Basic SIEM Analytics Steps to Know

Thu, 02 Nov 2017 24:00:00 EDT

All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Inside this guide, experts Karen Scarfone and Johna Johnson reveal tips on how to filter through data securely and catch threats before they harm your organization. Published by: TechTarget



Mastering the Art of Database Backup and Recovery

Thu, 26 Oct 2017 24:00:00 EDT

DBAs are usually concerned with backing up their databases, but they should spend more time focusing on database recovery as part of the backup process. Read this expert guide to learn how to cover all your DB recovery bases and how to back up data more efficiently. Published by: Oracle Corporation UK Ltd



Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

Fri, 27 Oct 2017 24:00:00 EDT

In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now. Published by: ComputerWeekly.com



Multi-factor Authentication for dummies

Fri, 27 Oct 2017 24:00:00 EDT

The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more. Published by: iovation, Inc.



The Critical Elements of IoT Security

Fri, 27 Oct 2017 24:00:00 EDT

IoT devices are on the rise. Read this white paper to gain a stronger understanding of how to build an IoT security strategy to help increase your network performance and reliability. Published by: Fortinet, Inc.



Beyond the Router: Architecting an Application-Driven WAN Edge

Thu, 26 Oct 2017 24:00:00 EDT

In this white paper, gain a stronger understanding of the benefits associate with moving towards a software-defined, application-driven WAN. Published by: Silver Peak



Strategies for the Enterprise to Address Today's Top Security Vulnerabilities

Thu, 26 Oct 2017 24:00:00 EDT

In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them. Published by: Fortinet, Inc.



Preparing for the General Data Protection Regulation

Thu, 26 Oct 2017 24:00:00 EDT

Gain a stronger understanding of GDPR compliance and implications for your network security. Published by: Fortinet, Inc.



6 Key Use Cases for Securing Your Organization’s Cloud Workloads

Thu, 26 Oct 2017 24:00:00 EDT

According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure. Published by: CyberArk Software, Inc



Powerful DDoS Attacks & Recovery for Enterprises

Tue, 24 Oct 2017 24:00:00 EDT

A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn. Published by: Arbor Networks



DDoS Mitigation: Types of DDoS Attacks and Security Considerations

Fri, 27 Oct 2017 24:00:00 EDT

Our experts discuss various DDoS mitigation services and what your organization should consider before implementing cloud DDoS protection. Then, uncover the various types of DDoS attacks and the steps to take towards a more secure and reliable future. Published by: Arbor Networks