Information Security Research Library

Powered by Bitpipe.com

CyberterrorismResearch

  • Get the Facts On APTs To Avoid Misguided Security Efforts

    Sponsored by: IBM

    This expert E-Guide cuts through the confusion, explaining exactly what an APT is, what they are capable of, and how you can best defend your organization from them.

  • Advanced Persistent Threats: Expert Strategies for IT Security

    Sponsored by: IBM

    This expert E-Guide outlines the best practices for organizations to defend themselves against these malicious attacks and to prevent them before they happen.

  • NS Security with CSO Online

    Sponsored by: Citrix

    This webcast looks at threats to web applications and properties and gives tips on how organizations can secure web application properties.

  • The Essential Elements of Critical Infrastructure Protection against Advanced Threats

    Sponsored by: FireEye

    This white paper highlights the current challenges organizations face in terms of cybersecurity. It also mentions 3 essential elements to an effective Critical Infrastructure Protection approach.

  • Diversionary and Multivector DDoS Attacks

    Sponsored by: Juniper Networks, Inc.

    In this essential white paper, you'll learn about the rise of these destructive attacks, why they are so difficult to block, and how an integrated security solution could help keep your organization protected.

  • The New Breed of DDoS Attacks: An Executive Brief

    Sponsored by: Juniper Networks, Inc.

    This informative resource breaks down the new breed of DDoS attacks, and provides strategies for keeping your organization protected.

  • Sharing knowledge to tackle online banking fraud

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

  • Terrorist use of the internet

    Sponsored by: ComputerWeekly.com

    Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats?

  • The Case For Modernizing Your Data Protection Strategy In 2014

    Sponsored by: Datto, Inc.

    This guide lists the biggest threats facing data protection strategies today and offers advice as to why organizations should consider upgrading their approaches with new technologies and solutions.

  • Migrating from Windows XP: Understanding the Challenges and How to Mitigate Them

    Sponsored by: Dell and Microsoft

    This paper describes how effective Windows migration projects can be broken down into four manageable phases, and how industry best practices and products can reduce the time and disruptions caused by a migration from XP to Windows 7 or 8, as well as provide IT more time and resources to focus on more strategic initiatives.

  • Getting the Most out of Your Windows Upgrade

    Sponsored by: Dell, Inc. and Windows 8 Pro

    This webinare from Dell explains how the end of Microsoft XP support will impact organizations still using it. It also talks about challenges of migration from either XP or Windows 7 or 8 and touches on what's next for organizations who have already migrated.

  • Hackers, Hacking, and CEHv8

    Sponsored by: Global Knowledge

    This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.

  • CW Buyers Guide To Finance and Insurance

    Sponsored by: ComputerWeekly.com

    This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.

  • Accenture Technology Vision 2014

    Sponsored by: ComputerWeekly.com

    The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.

  • Global Risks 2014

    Sponsored by: ComputerWeekly.com

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • Cybercrime and warfare: All that matters

    Sponsored by: ComputerWeekly.com

    Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.

  • Global profiles of the fraudster

    Sponsored by: ComputerWeekly.com

    Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.

  • Efficacy of Emerging Network Security Technologies

    Sponsored by: ComputerWeekly.com

    The report, which surveyed 4,774 global IT and IT security professionals across nine countries identifies the challenges enterprises are facing dealing with emerging security threats.

  • Underexposed risks of public Wi-Fi hotspots

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.

  • Information security trends

    Sponsored by: ComputerWeekly.com

    This report from CompTIA, based on original research, assesses the current trends in information security.

  • Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation

    Sponsored by: IBM

    Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.

  • System z, x86, UNIX: Which is more secure?

    Sponsored by: IBM

    Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.

  • Search Security University: Cyber Security

    Sponsored by: SearchSecurity.com

    Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  • The New Reality of Stealth Crimeware

    Sponsored by: McAfee, Inc.

    This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.