Information Security Research Library

Powered by Bitpipe.com

CyberterrorismResearch

  • Channel Edge MSP Program

    Sponsored by: Webroot

    This white paper explains the new approach to endpoint security for MSPs from Webroot that ensures security while minimizing downtime, improving efficiency and cutting costs.

  • Migrating from Windows XP: Understanding the Challenges and How to Mitigate Them

    Sponsored by: Dell and Microsoft

    This paper describes how effective Windows migration projects can be broken down into four manageable phases, and how industry best practices and products can reduce the time and disruptions caused by a migration from XP to Windows 7 or 8, as well as provide IT more time and resources to focus on more strategic initiatives.

  • Can the UK Find Security in US Cloud Services?

    Sponsored by: Peak 10

    This resource goes over the facts about the UK's attitudes towards the cloud and data security and gives some insight into where the focuses will shift in the coming years.

  • Hackers, Hacking, and CEHv8

    Sponsored by: Global Knowledge

    This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.

  • Managing Network Security Risks in Complex Environments

    Sponsored by: Hewlett-Packard Company

    This informative webcast from Kenneth Yip, product manager from Hewlett-Packard, talks about the four steps to mitigating the risk of DDoS and how new technologies like Adaptive Web Application Firewalls can be leveraged to make you're your organization is protected from cyber-attack.

  • CW Buyers Guide To Finance and Insurance

    Sponsored by: ComputerWeekly.com

    This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.

  • Accenture Technology Vision 2014

    Sponsored by: ComputerWeekly.com

    The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.

  • Global Risks 2014

    Sponsored by: ComputerWeekly.com

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • Cybercrime and warfare: All that matters

    Sponsored by: ComputerWeekly.com

    Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.

  • Tracked, Hacked and Attacked

    Sponsored by: IBM

    Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.

  • Global profiles of the fraudster

    Sponsored by: ComputerWeekly.com

    Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  • Case Study: Banca Intesa Counters Threats with HP ArcSight

    Sponsored by: Hewlett-Packard Limited

    Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.

  • Efficacy of Emerging Network Security Technologies

    Sponsored by: ComputerWeekly.com

    The report, which surveyed 4,774 global IT and IT security professionals across nine countries identifies the challenges enterprises are facing dealing with emerging security threats.

  • Underexposed risks of public Wi-Fi hotspots

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.

  • Information security trends

    Sponsored by: ComputerWeekly.com

    This report from CompTIA, based on original research, assesses the current trends in information security.

  • Accenture Technology Vision 2013

    Sponsored by: ComputerWeekly.com

    Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.

  • Evolving Threats Demand New Approaches To Security

    Sponsored by: Akamai Technologies

    Consult this white paper for a profile of the evolving cast behind today's advanced threats and find out the key steps you can take to ensure enterprise security – click through to read on.

  • 2012 Cost of Cyber Crime Study: UK

    Sponsored by: ComputerWeekly.com

    The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.

  • Cyber Vulnerability Index 2012

    Sponsored by: ComputerWeekly.com

    More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.

  • Advanced cyber-security intelligence

    Sponsored by: ComputerWeekly.com

    Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.

  • Search Security University: Cyber Security

    Sponsored by: SearchSecurity.com

    Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.

  • The New Reality of Stealth Crimeware

    Sponsored by: McAfee, Inc.

    This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.

  • Cybersecurity Information Sharing: Establishing New Protocols

    Sponsored by: BMC Software, Inc.

    This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.

  • E-Guide: Clearing Up the Confusion to Prepare for APTs

    Sponsored by: Dell SecureWorks

    Consult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.