Research Library

Powered by

Cybersecurity Research

  • Fragmentation: The "Silent Killer" of Your Security Management Program

    Sponsored by: ThreatConnect

    This paper looks at the issues caused by security fragmentation and lays out a path towards better security through better unity, one that cuts the detection deficit with a cohesive, intelligent defense.

  • Barracuda NextGen Firewall Advanced Threat Detection

    Sponsored by: Barracuda Networks

    Discover how to protect against today's targeted malware using a cloud-based sandboxing that provide granular visibility into malware behavior. Learn how to stop today's advanced malware and ransomware attacks with dynamic analysis and detailed forensics.

  • Barracuda NextGen Firewall X: Simple Cloud-Based Network Management for Small to Midsized Businesses

    Sponsored by: Barracuda Networks

    Discover a next-generation firewall that can stand up to new and evolving cyber threats. Gain antivirus and web filtering functionality without the need for additional IT staff or special training.

  • The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector

    Sponsored by: A10 Networks

    In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.

  • DDoS Prevention For Attacks That Bypass DNS Rerouting

    Sponsored by: Radware

    In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.

  • Trustwave Secure Web Gateway Cloud for the Financial Industry

    Sponsored by: Trustwave

    Discover how to get superior protection, control and visibility from your cloud security platform. Allow security experts to monitor security alerts and manage all policy updates so you can spend resources elsewhere.

  • Why You Need to Test All Your Cloud, Mobile and Web Applications

    Sponsored by: Trustwave

    This white paper addresses the importance of complete application testing and gives you recommendations on how to beat the challenges associated with protecting all web applications. Learn how to prioritize testing to receive the greatest ROI and manage your risk without a huge monetary investment.

  • Stop Malware Before It Stops You

    Sponsored by: Trustwave

    Detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways.

  • Best-of-Breed Next-Generation Security For the Mid-Market

    Sponsored by: Barracuda Networks

    Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats.


    Sponsored by: Trustwave

    Discover a better answer to target malware within this white paper. Learn how to protect against dynamic, cross-component malware threats and get a full view into your past with historical views of web usage and threats, malware detected and malicious activity blocked.

  • DDoS Response Playbook

    Sponsored by: Imperva

    Discover how to plan for and execute a DDoS response plan. Learn pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.

  • Case Study: Technology Manufacturer Stops TeslaCrypt Attack

    Sponsored by: Carbon Black

    Download this case study to learn how to unravel, remediate, and moreover protect against all endpoint attacks (such as TeslaCrypt ransomware). Implement complete endpoint visibility with a proactive response platform that can reduce your number of breaches to zero.

  • Protecting Critical Assets from Unauthorized Access

    Sponsored by: IBM

    Learn how identity and access management is at the heart of every cybersecurity strategy. Uncover how to safeguard mobile, cloud and social access; prevent advanced insider threats; simplify cloud integrations and identity silos; and more.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: Barracuda Networks

    Discover how dire an issue phishing and ransomware has become, and learn how to mitigate them effectively. Through vulnerability analysis, threat intelligence, good backup processes and, most importantly, common sense, you can reduce your organization's risk of infection down to zero percent.

  • Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics

    Sponsored by:

    This virtual event, produced jointly by ISACA,, and focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • Log Management and Automation for NIST Cyber Security Framework

    Sponsored by: LogRhythm, Inc.

    This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.

  • 10 Reasons You Should Consider a Career in Cybersecurity

    Sponsored by: Global Knowledge

    If you're already in the IT field, shifting gears to focus on cybersecurity is not as much of a transition as you might first think. This white paper highlights 10 key reasons you should consider a career in cybersecurity.

  • Ransomware — Anatomy of an Attack

    Sponsored by: OpenDNS

    Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.

  • Data Governance: Expert Q&A and Picking The Right DG Tool

    Sponsored by: Globanet Veritas

    This e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

  • 4 Ways Neustar Strengthens your DNS Security

    Sponsored by: Neustar

    The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.

  • No Downtime, No Problem. Silverstring Protects Customers and Their Data

    Sponsored by: Neustar

    Discover how Silverstring protects their customers' mounds of data and keep their site up and running without the risk of downtime. With top notch performance, availability and security, Silverstring rests assured that they can meet any IT challenge they face moving forward.

  • DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us

    Sponsored by: Neustar

    Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.