Security News White Papers

Computer Weekly – 22 January 2019: Moving beyond network boundaries

Security News White Papers - Fri, 01/25/2019 - 12:00am
In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now. Published by: ComputerWeekly.com

Managing Customer Data in the GDPR Era

Security News White Papers - Thu, 01/24/2019 - 12:00am
Download this expert guide to learn more about why enterprises need to train agents on how to properly process incoming customer requests to delete or reduce customer data, while maintaining GDPR compliance. Published by: GearsDesign

Active Workload Protection on Amazon EKS and AWS Fargate

Security News White Papers - Wed, 01/23/2019 - 12:00am
Learn some of the best container security tools and techniques from AWS in this webinar and ensure your applications are secured well before they're deployed. Published by: Aqua Security

Preventive Security for Kubernetes Enterprise Deployments

Security News White Papers - Wed, 01/23/2019 - 12:00am
Tune in to learn about a Kubernetes tool that gives you an easy way to identify potential weaknesses in your deployments so that you can address those issues before they are exploited by hackers. Published by: Aqua Security

Enforcing Immutability & Least Privilege to Secure Containerized Applications on Openshift

Security News White Papers - Wed, 01/23/2019 - 12:00am
In this webinar, learn more on how you can secure your containers with an approach that enforces immutability and least privilege. Published by: Aqua Security

How Neustar SiteProtect NG Safeguards its Customers

Security News White Papers - Wed, 01/23/2019 - 12:00am
In this video, hear from 6 Security and Network professionals on how their leading businesses were able to mitigate DDoS attacks using Neustar SiteProtect NG. Published by: Neustar

IT outlook in 2019

Security News White Papers - 12 hours 15 min ago
In this e-guide, find out what dominated the headlines in 2018, as well as key areas worth looking out for over the next 12 months. Published by: ComputerWeekly.com

The future of databases in APAC

Security News White Papers - Wed, 01/16/2019 - 12:00am
In this e-guide, read more about the promises of autonomous databases, why relational databases are poor at running digital transformation projects, and why Amazon Web Services decided to switch off its Oracle data warehouse. Published by: ComputerWeekly.com

CIO Trends #8: Benelux

Security News White Papers - Wed, 01/16/2019 - 12:00am
In this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world. Published by: ComputerWeekly.com

Top 10 IT security stories of 2018

Security News White Papers - Wed, 01/16/2019 - 12:00am
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018. Published by: ComputerWeekly.com

January ezine: SD-WAN is taking off

Security News White Papers - Fri, 01/11/2019 - 12:00am
There has been plenty of talk about SD-WAN and the moment has arrived where the technology is making money for the channel Published by: MicroScope

Top 10 cyber crime stories of 2018

Security News White Papers - Thu, 01/10/2019 - 12:00am
This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018 Published by: ComputerWeekly.com

How to Manage the Multi-cloud with Security and Strong Data Backup

Security News White Papers - Wed, 01/09/2019 - 12:00am
The following e-book will help you with managing multi-cloud backup and security. Read it here to learn everything you need to know about securing a multi-cloud deployment, multi-cloud management must-haves, and more. Published by: SearchStorage.com

Top 10 Benelux IT stories of 2018

Security News White Papers - Wed, 01/09/2019 - 12:00am
The Netherlands and Belgium might be small in terms of population and land area, but they are leading nations when it comes to the use of technology in society. There are numerous examples of the transformative nature of IT in the Netherlands and Belgium in this top 10, such as plans for autonomous ships and smart city developments. Published by: ComputerWeekly.com

You Can't Spell Enterprise Security without MFA

Security News White Papers - Mon, 01/07/2019 - 12:00am
Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and controls with multi-factor authentication, allowing them to move away from a high-risk, password based security approach. Listen as Paul Madsen from the CTO office of Ping Identity explains the benefits of MFA. Published by: Ping Identity Corporation

Inner Workings of Ransomware and Ways to Detect and Respond

Security News White Papers - Mon, 01/07/2019 - 12:00am
Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain. Published by: Arctic Wolf

To SIEM or Not to SIEM, Find Out Your Options

Security News White Papers - Mon, 01/07/2019 - 12:00am
With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to building their own in-house SIEM. The main business reasons that organizations acquire a SIEM are to easily detect threats and to be able to meet compliance reporting mandates. Published by: Arctic Wolf

CEO Insights - Cybersecurity Predictions for 2019

Security News White Papers - Mon, 01/07/2019 - 12:00am
Cybercriminals continued on their rampage in 2018 hacking into name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down in 2019. In this webcast, Brian NeSmith walks through the top cybersecurity predictions for 2019 and what organizations can do to best prepare for them. Published by: Arctic Wolf

The Values of Both Building Your Own SOC and Buying SOC-as-a-Service

Security News White Papers - Mon, 01/07/2019 - 12:00am
SOC is no longer an option, but a necessity for all businesses. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you. Published by: Arctic Wolf

How Healthcare Organizations Can Combat Security Threats

Security News White Papers - Fri, 01/04/2019 - 12:00am
Learn how your organization can meet compliance obligations while maintaining an optimal security strategy that detects and responds to advanced security threats. Published by: Arctic Wolf

Pages