Security News White Papers

Case Study: CIO interview - Stephen Docherty on NHS data sharing

Security News White Papers - Thu, 05/16/2019 - 12:00am
The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why Published by: ComputerWeekly.com

Who needs security orchestration, automation and response?

Security News White Papers - Wed, 05/15/2019 - 12:00am
Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects. Published by: SearchSecurity.com

Why Security Matters in DevOps

Security News White Papers - Tue, 05/14/2019 - 12:00am
DevSecOps has become an essential component to the way we develop, ship, and maintain code, but without proper security practices in place, the DevOps pipeline can lead developers to deploy compromised code. Discover why security for DevOps is so important, as well as tools that can help you build security into your DevOps pipeline. Published by: Trend Micro, Inc.

A Guide to Joining DevOps and Security

Security News White Papers - Fri, 05/10/2019 - 12:00am
If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly. Published by: Trend Micro, Inc.

Secure DevOps Brings Better, Faster, Safer Software

Security News White Papers - Fri, 05/10/2019 - 12:00am
In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today. Published by: SearchSecurity.com

Computer Weekly – 7 May 2019: Nurturing innovation at DWP

Security News White Papers - Fri, 05/10/2019 - 12:00am
In this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now. Published by: ComputerWeekly.com

MicroScope - May 2019: Packaged services – the global shift towards virtual distribution

Security News White Papers - Fri, 05/10/2019 - 12:00am
In this month's issue, we cover changes in distribution and the challenges being faced by those aiming to add value. Published by: MicroScope

Converged Data Protection: Benefits, Drawbacks, and Product Comparisons

Security News White Papers - Tue, 05/07/2019 - 12:00am
Because converged data protection is still relatively new, questions and concerns abound regarding the benefits and drawbacks of deployment. That's why we took the time to curate the following e-book for you, Converged Secondary Storage: Expanding the HCI Model, to cover the breadth of questions your company may have. Read it here. Published by: TechTarget

Endpoint Security: from A to (N)Z

Security News White Papers - Tue, 05/07/2019 - 12:00am
In this e-guide, find out how ANZ enterprises are approaching endpoint security and the tools you can add to your endpoint security arsenal. Published by: ComputerWeekly.com

Infographic: 2019 Europe IT Priorities - Datacentre

Security News White Papers - Tue, 04/30/2019 - 12:00am
In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr. Published by: ComputerWeekly.com

Infographic: 2019 Europe IT Priorities - Security

Security News White Papers - Tue, 04/30/2019 - 12:00am
In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr. Published by: ComputerWeekly.com

How long does it take to get owned?

Security News White Papers - Tue, 04/30/2019 - 12:00am
A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker. Published by: ComputerWeekly.com

The Rise of Spear Phishing Attacks & Email Fraud

Security News White Papers - Fri, 04/26/2019 - 12:00am
Almost half of UK organizations have been compromised in the past two years using phishing attacks, despite high levels of cyber awareness and training, research shows. Download this e-guide to learn about the rise of phishing and email security, today. Published by: Barracuda

Rethinking the Cyber Security of Consumer Internet of Things

Security News White Papers - Thu, 04/25/2019 - 12:00am
The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions. Published by: ComputerWeekly.com

Phishing: Das steckt dahinter

Security News White Papers - Wed, 04/24/2019 - 12:00am
Bei Phishing-Angriffen wird dem Empfänger häufig suggeriert, er kommuniziere mit jemandem Vertrauenswürdigem aus dem eigenen Unternehmen, um ihn etwa zu einer Überweisung oder der Preisgabe von Daten zu bewegen. Wie Phishing-Angriffe geplant werden und wie Sie sich noch besser schützen können, erfahren Sie hier. Published by: Barracuda

Who needs security orchestration, automation and response?

Security News White Papers - Wed, 04/24/2019 - 12:00am
Who needs tools for security orchestration, automation and response? Only organizations that that are short-staffed and overworked. In other words: nearly everyone. Learn how SOAR tools ease the burden of rote but required security tasks and free up security pros for more challenging IT security projects. Published by: SearchSecurity.com

The exploitation of flaws in the HTTPS protocol - 20 years of Bleichenbacher's attack

Security News White Papers - Tue, 04/23/2019 - 12:00am
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented. Published by: ComputerWeekly.com