ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

  • Pilot Light DR for Amazon Web Services

    Sponsored by: CloudVelox

    Speed, safety, and cost are all central concerns surrounding disaster recovery (DR). This is where cloud comes into play. Access this data sheet to learn about the key functions that cloud-based DR for AWS delivers and how they'll impact your business.

  • 2017 Study on Mobile and IoT App Security

    Sponsored by: IBM

    According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.

  • How to Keep Your Data Secure In An Increasingly Insecure World

    Sponsored by: Micron

    Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.

  • BCBS 239: How You Can Meet Regulatory Obligations & Optimize Cost Reductions

    Sponsored by: SAS

    It's been a few years since the Basel Committee on Banking Supervision (BCBS) published BCBS 239, but many institutions are still struggling to comply with this regulation. This white paper explains what's needed for superior risk management processes and provides a framework for adopting BCBS 239 successfully.

  • Object Storage 101

    Sponsored by: ComputerWeekly.com

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

  • Methods for Preventing Hospital Ransomware Infections and Cyberattacks

    Sponsored by: Cisco

    The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.

  • Learn To Build A Holistic Cybersecurity Program

    Sponsored by: Presidio Networked Solutions

    In this expert-eguide, learn how you can take a proactive approach to protecting your information systems, and how to vet vendors before trusting them with your data.

  • Are we trusting social networks too much?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Cybersecurity Essentials for 2017

    Sponsored by: Neustar

    In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine essential cybersecurity trends and highlight key tactics to better prepare you for what the coming year may bring.

  • Why Mobile Devices are the Biggest Enterprise Security Threat

    Sponsored by: BlackBerry

    Enterprises are losing the security battle and mobile devices are the biggest threat. In this webcast, learn effective ways to manage risks and mitigate threats associated with mobile devices and how mobile security can enable your business and employees to be more productive.

  • Protecting Your Business in the Digital Transformation Journey

    Sponsored by: Hewlett-Packard Enterprise

    As digital transformation shifts the business risk landscape, IT security must change with it. In this white paper, discover the role mobile devices play in modern security networks, how to build a comprehensive security program and more.

  • Global Risks Report 2017

    Sponsored by: ComputerWeekly.com

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

  • IT Security 101: Think Like A Cybercriminal

    Sponsored by: Solarwinds MSP

    In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the 6 key things to consider when assessing your IT security plan.

  • Secure, Cloud-Managed Wifi

    Sponsored by: WatchGuard Technologies, Inc.

    In this white paper, learn how to implement Wi-Fi in safe, protected airspace without the normal administrative headaches.

  • Focus: Securing for the future

    Sponsored by: ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Malware Prevention vs. Detect and Respond

    Sponsored by: Dell India

    Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.

  • Insights Into How Math Can Defeat Malware

    Sponsored by: Dell India

    Malware has always evolved faster than security measures could keep up...until now. Access this white paper to learn about a math and machine-learning approach that enables you to identify potential threats based on mathematical risk factors, so that you can make the right decisions in real time.

  • Trustwave Global Security Report

    Sponsored by: SingTel

    Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.

  • 2016 Security Pressures Report

    Sponsored by: SingTel

    The recommendations in this resource can serve as a reliable compass for where your security efforts need to be going into the future. These best practices will not only placate security pressure, but also help make your organization more secure overall.

  • IoT Strategy: 8 Key Questions to Ask

    Sponsored by: Cisco Systems, Inc.

    IoT introduces tremendous risk if the connected products and services are not designed, deployed and supported properly. The 8 questions presented in this white paper provide a step-by-step approach for turning an IoT vision into reality.

  • Protecting the 3 Areas of Secure Mobility

    Sponsored by: BlackBerry

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

  • Best Practices for Healthcare Data Breach Prevention

    Sponsored by: Absolute

    As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.

  • How to Identity Web Threats in Real-Time

    Sponsored by: Symantec & Blue Coat Systems

    Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.

  • What's The Best Risk Analysis Method for Enterprises?

    Sponsored by: Presidio Networked Solutions

    In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.