ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Guidance on Healthcare Ransomware Attacks

    Sponsored by: OpenDNS

    Learn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated.

  • Five Important Steps to Ransomware Remediation in Health IT

    Sponsored by: OpenDNS

    Discover five key steps for responding to hospital ransomware attacks within this e-guide. Health IT expert Reda Chouffani will help you better understand the anatomy of ransomware and help you devise a recovery plan if ransomware should strike.

  • Harnessing the Power of Metadata for Security

    Sponsored by: Gigamon

    Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation. Learn how to enable more in-depth security analysis of traffic that is focused on the areas of concern, ultimately resulting in faster time to detection, response, and mitigation.

  • Importance of Incident Response Collaboration

    Sponsored by: Dimension Data

    This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.

  • TAG Cyber Report: 2017 Security Annual – Vol. 1

    Sponsored by: Digital Guardian

    This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.

  • New Tools Lead to Refined GRC Practices

    Sponsored by: Proofpoint, Inc.

    See why most enterprises still struggle with governance, risk and compliance processes in the digital age. In this e-guide, learn the history of tried and failed document sorting methods and discover new tools, like text analytics and auto-classification that can help compliance practices in the future.

  • Penetration Testing Services Data Sheet

    Sponsored by: IBM

    Because high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is clearly required. This data sheet details one group of security professionals whose goal is to help you discover vulnerabilities in your computer networks, hardware, and software applications before criminals do.

  • Deriving Value from the Technical Security Test

    Sponsored by: SecureWorks

    Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.

  • Securing the Unpatchable

    Sponsored by: Palo Alto Networks

    Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Advancing Endpoint Security: The Importance of Threat Intelligence, Visibility

    Sponsored by: SecureWorks

    Discover how to mix anti-malware capabilities with high-level visibility and behavioral based detection to eliminate endpoint threats. By arming yourself with these weapons, your organization can not only detect threat actors and their tradecraft, but also slash time of response, minimizing the damage they cause.

  • NSS Labs 2016 Breach Detection System (BDS) Group Test Results

    Sponsored by: Fortinet, Inc.

    Expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection.

  • Cyber Security Recommendations from the C-Suite

    Sponsored by: Radware

    From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.

  • How GuideStar Stabilized Website Availability by Blocking Bad Bots

    Sponsored by: Distil Networks

    Learn how GuideStar countered their invasive bot problem, stabilized their site to recover 99.7% uptime, and still allowed good traffic to get through unhindered. Also discover how they saved 20 hours a month of IT effort and reigned in an out-of-control issue that seemed insurmountable.

  • Nucleus Research Guidebook: IBM QRadar on Cloud

    Sponsored by: IBM

    Learn how to eliminate the need for expensive hardware and IT personnel oversight by utilizing the cloud. Deploy quickly and achieve faster time to value with a growing range of additional cloud security services. Realize the benefits of a managed cloud infrastructure and more through this brief resource.

  • The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls

    Sponsored by: Palo Alto Networks

    This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.

  • An Agent of Change in an Era of Intensifying Threats

    Sponsored by: Check Point Software Technologies Ltd.

    Discover a defense system tailored specially for your network that includes advanced sandboxing with CPU-level detection. Take the on-going cyberwar back to your cyberthieves' doorsteps by understanding the tools they use, their chosen attack vectors and the methods they employ.

  • Security Framework: A Guide for Business Leaders

    Sponsored by: Palo Alto Networks

    Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.

  • The Insider Threats: Be Protected with Advanced DNS Security

    Sponsored by: EfficientIP

    See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.

  • 2016 Data Threat Report: Trends in Encryption and Data Security

    Sponsored by: Vormetric

    Access this report now to learn statistics from around the globe describing how large enterprises are misplacing their security dollars and what you can do to best protect your sensitive data in today's hostile cyber environment.

  • Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture

    Sponsored by: EfficientIP

    Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.

  • 5 Steps to Protect Yourself From Ransomware

    Sponsored by: arcserve

    This short infographic gives you 5 steps to protect your enterprise from the scourge that is ransomware. You'll learn how to empower your employees against ransomware attacks and how to properly plan for disaster before disaster strikes.

  • Optimize High-Performing DNS Infrastructures for Greater Security

    Sponsored by: EfficientIP

    In this white paper, you will examine three methods of optimizing DNS infrastructure to achieve greater security, performance, simplicity, and a drastic reduction in TCO. Access now to learn how to eliminate useless server farms to reduce energy costs and improve protection against furtive attacks.

  • Data Access Governance Solutions On-Demand Demo

    Sponsored by: STEALTHbits

    This 60-minute webinar will teach you how your organization can implement a concrete data access governance program that won't break your back, or the bank. You'll learn both tactical and strategic approaches to unstructured data management and have your most important questions answered along the way.

  • Outsmarting Ransomware: Protect Your Money and Assets

    Sponsored by: arcserve

    Watch this highly informative webinar from featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.