Security News White Papers

Subscribe to Security News White Papers feed
White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe
Updated: 34 min 15 sec ago

Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?

Tue, 06/02/2020 - 12:00am
In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now. Published by: ComputerWeekly.com

CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits

Thu, 05/28/2020 - 12:00am
Tech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment. Published by: ComputerWeekly.com

Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality

Tue, 05/26/2020 - 12:00am
In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now. Published by: ComputerWeekly.com

Conversational File Transfer and Data Security

Fri, 05/22/2020 - 12:00am
When it comes to the world of IT, there are a few philosophiesthat seem to be universally true. No, I'm not talking aboutMoore's Law. I'm talking about simpler philosophies like"garbage in, garbage out" or PICNIC errors. For the uninitiated,PICNIC stands for "Problem in Chair, Not in Computer" Published by: Progress Software, Inc.

Can Lady Gaga and Madonna get people to take security seriously

Thu, 05/21/2020 - 12:00am
What does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. Read more in this PDF. Published by: ComputerWeekly.com

CW APAC: Trend Watch - business response to coronavirus

Thu, 05/21/2020 - 12:00am
With countries the world over reeling from the Covid-19 coronavirus outbreak, which has meant sweeping changes both economically and socially, Computer Weekly looks at how firms in the Asia-Pacific region have adapted to what has so quickly become the new normal. Published by: ComputerWeekly.com

Getting Cloud Security Right

Mon, 05/18/2020 - 12:00am
In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be. Published by: ComputerWeekly.com

9 essential elements of network security

Fri, 05/15/2020 - 12:00am
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other. Published by: ComputerWeekly.com

Cloud-ready ADC: Simplify management of your complex environment

Thu, 05/14/2020 - 12:00am
Traditional app delivery solutions help ensure availability, performance, and security, but not all solutions can bridge the gap between modern and legacy application environments. Download this white paper to learn about a cloud-ready application delivery controller that helps to simplify complex environments and adapt to changing needs. Published by: Citrix

Seven Strategies to Securely Enable Remote Workers

Wed, 05/13/2020 - 12:00am
Laying the groundwork to securely enable a remote workforce could make or break a company's ability to sustain business operations should a crisis require large populations to remain at home. Published by: BlackBerry

BlackBerry launches Digital Workplace to securely enable distributed work environments

Wed, 05/13/2020 - 12:00am
BlackBerry recently unveiled its new Digital Workplace platform, a web portal and workspace for secure online and offline access to corporate on-premises or cloud-based enterprise resources and content. Published by: BlackBerry

BlackBerry Desktop

Wed, 05/13/2020 - 12:00am
With BlackBerry Desktop, you can give your users secure access to email, corporate websites, servers, content, and files on their personal or non-corporate managed Windows 10 and macOS devices. Published by: BlackBerry

Maintaining Network Infrastructure in a Pandemic and Beyond

Tue, 05/12/2020 - 12:00am
As workers join video conferences and access corporate resources remotely, they're likely unaware of the network infrastructure that supports those actions -- until something doesn't work. In this e-guide, learn how to prepare your network for an increased number of remote workers. Published by: SearchNetworking.com

A Guide to DNS Security & How it Addresses DDoS Attacks

Mon, 05/11/2020 - 12:00am
DDoS attacks are unique in the way that target and infect an organizations bandwidth, leading to long downtimes and costly disruptions. Written by out networks security experts, our DDoS e-guide explores the anatomy of various DDoS attacks and offers best practices for defending against them. Take our short survey to receive your free copy. Published by: TechTarget

Defending Your Endpoints Against Cyberattacks

Mon, 05/11/2020 - 12:00am
Phishing scams and other cyberattacks are at an all-time high, and traditional defense tactics are growing ineffective. Written by our security experts, our endpoint security e-guide helps you search, screen and select the best fit security tool for your needs. Simply complete our 5-10-minute survey to reserve your free copy. Published by: TechTarget

CISSP Exam Prep: Changes to Know About Before You Get Started

Mon, 05/11/2020 - 12:00am
The CISSP (Certified Information Systems Security Professional) exam was updated with changes to the topics covered and format of the test. Luckily, we have a new study guide just for you. Simply complete our online survey and you will receive a free download of the revisions to the exam as well as tips and tricks for passing the exam. Published by: TechTarget

Perform critical event management in 5 steps

Mon, 05/11/2020 - 12:00am
Access this white paper to learn the 5 basic steps to get your organization started with critical event management (CEM) and how to build a business case for it. Published by: EverBridge Inc.

RSA Conference 2020 guide: Highlighting security's human element

Mon, 05/11/2020 - 12:00am
The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings. Published by: ComputerWeekly.com

How to Build an Effective Incident Response Strategy

Mon, 05/11/2020 - 12:00am
To address increasingly disruptive cyberattacks, security teams are adopting incident response (IR) plans to formalize the way they identify and mitigate cyberattacks. Our incident response e-guide provides the information you need to get started with building your IR plan, from assigning tasks to choosing tools to incorporate. Published by: TechTarget

SaaS Backup in the Modern Age: Must-haves and Challenges

Mon, 05/11/2020 - 12:00am
SaaS adoption is certain, yet one factor that remains most uncertain is perhaps the most important: backup. Simply fill out a few questions regarding your company's current backup strategy and you'll have instant access to our guides on Office 365 Backup, SaaS Backup Challenges & Best Practices, and Salesforce Backup Tools & Strategies. Published by: TechTarget

Pages