ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • The 411 on Mobile Application Security Testing and Runtime Protection for iOS Applications

    Sponsored by: IBM

    This webcast provides best practices for mobile application testing for security vulnerabilities and protecting them at runtime, with a special emphasis on iOS applications. You'll learn how to protect your ever-expanding portfolio of mobile apps, to stay one step ahead of the rush-to-release phenomenon.

  • Uncovering the Risk of SAP Cyber Breaches

    Sponsored by: Onapsis

    The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications

    Sponsored by: Onapsis

    Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.

  • Frost & Sullivan Best Practices Research: Network Security Forensics

    Sponsored by: RSA

    This white paper shows you a comprehensive set of technologies for incident detection and network security forensics that will greatly improve you security posture. Learn how to achieve depth and real-time visibility into the inbound and outbound communications traversing your network.

  • Account Takeover How Hacking Happens in 2016

    Sponsored by: IMMUNIO, Inc.

    This white paper helps you understand what's inside the head of a modern cybercriminal and the techniques they use to steal your hard earned data. Through this understanding, you'll be able to improve your security posture and reduce the likelihood of a breach quickly.

  • Inside Job: A Better Strategy to Stop Insider Threats

    Sponsored by: Infor

    Insider threats are the greatest risk to top-of-the-line cybersecurity. Your data and predictive analytics may be the best tools to protect against insider threats. This guide to insider threats walks you through a brief history of these threats, who could be considered insiders, and how to approach these issues now as well as in the future.

  • Protecting Mission-Critical Source Code from Application Security Vulnerabilities

    Sponsored by: IBM

    In this webcast, you'll learn how to test application source code for potential security vulnerabilities, so you can confidently release your organization's applications.

  • Making the Case for Application Security Testing on Cloud

    Sponsored by: IBM

    It presents to you the pros and cons of application security testing and penetration testing techniques. Discover how you can combat application security threats conveniently and effectively in the cloud.

  • Deep Security Protection from Ransomware

    Sponsored by: TrendMicro

    Ransomware is increasingly targeting servers, where attackers use known software vulnerabilities to inject ransomware. Learn how to protect your servers from ransomware attacks through anti-malware, intrusion prevention, integrity monitoring and web reputation.

  • Breach Detection Systems Test Report

    Sponsored by: TrendMicro

    This report shows you independent test results of a breach detection system. Uncover the overall test results, a product scorecard, and discover an analysis of its resistance to evasion techniques, detection of SSL encryption, and more.

  • SIEM’s Total Cost of Ownership – Key Considerations

    Sponsored by: LogRhythm, Inc.

    Through this short white paper, you'll understand how to take a holistic view on SIEM platform capabilities and discover the impact SIEM can have on your security people and processes. Learn what factors to consider when assessing SIEM business practicality and total cost of ownership.

  • Strategy Guide for Securing the SAP Landscape

    Sponsored by: Onapsis

    Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.

  • Looking for a partner to provide Multi-Factor Authentication?

    Sponsored by: RSA Softcat

    This infographic shows you what you should expect from your multifactor authentication solution vendor. Discover the solution that integrates with the simplest IT environment to the most complex out there so you don't have to choose between security and convenience.

  • Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

    Sponsored by: IBM

    The Endpoint Security Maturity Model provides helpful guidance for developing a long-term strategy for endpoint management. Read some of the results from the SANS 2016 Endpoint Security Survey to learn how organizations are dealing with the changing endpoint landscape and where they fall short.

  • How to Pass a Security Audit in One Day

    Sponsored by: Above Security

    This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).

  • How to Avoid the Illusion of Your Corporate Network

    Sponsored by: Above Security

    This webinar helps you understand what your business and security intersection looks like and how your risk management abilities could improve moving forward. Learn the inextricable link between business and security and how to best integrate cyber security with business practices.

  • Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and other breaches

    Sponsored by: LogRhythm, Inc.

    In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive.

  • IDC Report: Modern Defense Against Sophisticated Attacks Requires Comprehensive Endpoint Protection

    Sponsored by: RSA

    Discover how to bolster your existing security infrastructure with tools designed to detect advanced threats from each of the 3 STAP subcategories: endpoint, boundary, and internal network analysis. Learn how to combine capabilities designed to analyze suspicious files with behavioral analysis to identify suspicious file activity early.

  • Cybersecurity Poverty Index

    Sponsored by: RSA Softcat

    Uncover the findings of The Cybersecurity Poverty Index, completed by 878 respondents across 81 countries. It provides a measure of the risk management and information security capabilities of the global population.

  • Advanced Persistent Threats and the Case for a Security Intelligence and Response Program

    Sponsored by: Above Security

    Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.

  • An Enterprise Security Program and Architecture to Support Business Drivers

    Sponsored by: Above Security

    This white paper presents the case for leveraging enterprise security architectures to meet an organization's need for information assurance. It'll help you understand information assurance and show you how to align security initiatives with business goals to deliver an effective security program.

  • Ransomware

    Sponsored by: OpenDNS

    This podcast looks at ransomware and how the cybercrime business operates.

  • Ashley Madison

    Sponsored by: OpenDNS

    In this episode of Root Access, you'll take a look at the Ashley Madison breach, one of the most unique and impactful breaches in history. Uncover how it affected everyone on a personal level and the security details of how it occurred.

  • Application Defense In Depth

    Sponsored by: IMMUNIO, Inc.

    The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.

  • Security Analytics is the Cornerstone of Modern Detection and Response

    Sponsored by: RSA

    Within this white paper, read what Forrester Consulting discovered in their survey of 180 security professionals from countries around the world. Understand why mature organizations are moving to security analytics to mitigate today's advanced cyber threats and how SA can greatly improve your recognition of threat impacts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.