ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • The APAC Guide to Data Protection & GDPR

    Sponsored by: ComputerWeekly.com

    In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region.

  • The State of Endpoint Protection & Management

    Sponsored by: Absolute

    According to Larry Ponemon of the Ponemon Institute, 67% of enterprises are unable to detect employee use of insecure mobile devices. This white paper aims to answer some of the top questions security and IT operations executives face in regard to endpoint security, mobile security, and overall protection of your enterprise.

  • The 6 Phases of a DDoS Incident Response Plan

    Sponsored by: Arbor Networks

    Any enterprise that operates online needs to have robust defenses to detect and mitigate DDoS attacks. Key into this white paper to learn about how you can protect your organization against harmful DDoS attacks.

  • The Three Faces Of Insider Threat

    Sponsored by: Absolute

    Insider threats are an extremely challenging IT issue to resolve. In this white paper, uncover how to protect your organization against insider threats.

  • Why Banks Need a Dedicated Mobile Banking Security System

    Sponsored by: HID Global

    According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals frequently asked questions by consumers regarding mobile security.

  • Economics of DDoS Attacks

    Sponsored by: Arbor Networks

    DDoS attacks are cheaper than ever for the perpetrator, extremely lucrative for the attack service provider, and financially devastating for the target. Read this white paper to gain insight into DDoS attacks to prevent your company from having to pay the steep fines.

  • Check Your Armor: What's Your Most Vulnerable Cybersecurity Spot?

    Sponsored by: Simeio

    When a company experiences a data breach, hack or other compromise to infrastructure or assets, the company does not realize all of the risk mitigation steps that were overlooked. This white paper reveals a comprehensive identity checklist to ensure your company does not fall victim to a data breach in the first place.

  • PCI Compliance with Unified Security Management

    Sponsored by: AlienVault

    Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DDS 3.2.

  • Complying with GDPR: What All Organizations Need to Know

    Sponsored by: Absolute

    With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more.

  • The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business

    Sponsored by: Arbor Networks

    According to the Worldwide Infrastructure Security Report, 93% of survey respondents experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. Inside, learn how DDoS attacks have evolved and changed over time.

  • How To Become A Superstar Security Leader

    Sponsored by: Google Cloud

    As companies seek to innovate and engage customers through digital channels, they need superstar security leaders. This report looks at the biggest changes in firms' expectations of their chief information security officers and provides specific examples of how top information security professionals rise to those occasions.

  • 5 Steps to Implement & Maintain PCI DSS Compliance

    Sponsored by: AlienVault

    Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover steps to take to make the compliance process easy and secure.

  • Enterprise Endpoint Security Performance Benchmarks

    Sponsored by: Symantec & Blue Coat Systems

    This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.

  • What You SIEM is What You Get

    Sponsored by: AlienVault

    A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.

  • Threat Intelligence Evaluator's Guide

    Sponsored by: AlienVault

    One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.

  • 2017 Veritas GDPR Report Chapter 1

    Sponsored by: Veritas

    According to the Veritas 2017 GDPR Report, 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business.

  • The 4 Critical Areas You Must Address for Cloud Security

    Sponsored by: Symantec & Blue Coat Systems

    As companies grapple with the demands imposed by this shifting security landscape, it's critically important to consider the best risk mitigation steps to take. Dive into this white paper to uncover the 4 most commonly exposed risk points for cloud security.

  • 7 Features You'll Find in the Most Advanced DLP Systems

    Sponsored by: Symantec & Blue Coat Systems

    Cloud services and mobile devices have made the challenges of safeguarding company data even more severe. Explore this white paper to find 7 key features to look for when evaluating a DLP system for your company.

  • Anti-Virus Comparative

    Sponsored by: Symantec & Blue Coat Systems

    Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.

  • Case Study: Hyundai Department Store Group

    Sponsored by: Symantec & Blue Coat Systems

    Hyundai Department Store Group faced the challenges of needing to comply with the South Korean Personal Information Protection Act and put customers at ease that their personal information would be protected. In this case study, explore how Hyundai overcame this issue by implementing data loss prevention strategies.

  • GDPR Strategy Guide

    Sponsored by: Veritas

    The GDPR obliges businesses to understand and map how personal data flows throughout their organization in the form of Article 30 record. Jump start your compliance journey with this Veritas GDPR Strategy Guide to Article 30 creation.

  • The Buck Stops Where?

    Sponsored by: BitSight

    By 2020, Gartner estimates that 75% of Fortune 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. In this white paper, gain insight into how data breaches are affecting both large and small businesses and how these businesses can mitigate their risks of future data breaches.

  • 11 Steps IT Needs to Take When Adopting Cloud Apps and Services

    Sponsored by: Symantec & Blue Coat Systems

    Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.

  • Why Data Protection Is the Cornerstone of Modern Enterprise Security

    Sponsored by: Symantec & Blue Coat Systems

    According to IDC, by 2020, the amount of digital data is expected to reach 44ZB. In this white paper, explore various trends in data protection and security as well as an information-centric approach to data protection.

  • Extend Your DLP to the Cloud

    Sponsored by: Symantec & Blue Coat Systems

    With the rise of the cloud, your sensitive and compliance related data is at risk now more than ever. Find out how integrating your on premise Data Loss Prevention with CASB technology can enhance your cloud security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.