ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Why You Need to Control Shadow IT, Not Just Discover it

    Sponsored by: Symantec & Blue Coat Systems

    The rapid, often uncontrolled, growth in the adoption of cloud apps creates a need for improved visibility – it's impossible to control what you cannot see. Read this white paper to uncover how to ensure your organization's safe migration to the cloud.

  • Amazon Web Services: Risk and Compliance

    Sponsored by: Amazon Web Services

    Key into this white paper to explore a basic approach to evaluating AWS controls as well as AWS-specific information around general cloud computing compliance questions.

  • 5 Practical Ways to De-Risk Your Big Projects

    Sponsored by: Energized Work

    Every project carries risk, and if it doesn't, it's probably not going to add much value to your business. Learn how to effectively manage goals, communication, and user acceptance when undergoing complex digital business projects.

  • Enhance Your Security & Compliance for Amazon Web Services

    Sponsored by: CloudPassage

    As enterprises move applications from traditional data centers to a public or hybrid cloud environment, the security model needs to change. This white paper explores how you can boost your AWS security to keep up with this change.

  • Proofpoint Threat Response

    Sponsored by: Proofpoint, Inc.

    How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.

  • Architecting for HIPAA Security and Compliance on Amazon Web Services

    Sponsored by: Amazon Web Services

    AWS customers with HIPAA compliance requirements have a great deal of flexibility in how they meet encryption requirements for PHI. In this white paper, uncover HIPAA privacy and security rules and learn techniques for meeting compliance requirements.

  • Preparing for the Big One: General Data Protection Regulation

    Sponsored by: Smarsh

    Even if your organization is not physically located in the EU, the GDPR will most likely affect you as well. In this white paper, gain insight into GDPR requirements and what your organization must do to comply.

  • Strategies for API Security

    Sponsored by: Akamai Technologies

    APIs provide transparency to the internal structure of applications and provide granular access to an application's backend, making online businesses more vulnerable than ever before to cyberattack threats. This white paper outlines the most common types of cyberattacks and offers strategies for protecting APIs.

  • Top 5 Security Challenges Brought on by Mobile and Cloud

    Sponsored by: Entrust, Inc.

    50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.

  • The Top 5 Myths of Data Breaches

    Sponsored by: FireMon

    Debunking myths is an important step to improve the effectiveness of security defenses against future breach attempts. This white paper discloses who and what is at risk of a data breach and reveals the top 5 myths of data breaches.

  • Planning Considerations for Compliance with GDPR

    Sponsored by: FireMon

    If you haven't started your GDPR journey yet, now is the time. In this white paper, read about planning for GDPR compliance so that your organization does not fall victim to harsh fines.

  • Anatomy of a Privileged Account Hack

    Sponsored by: Thycotic

    Cybersecurity affects more than 3.6 billion internet users worldwide and 80% of hackers say humans are the most responsible. Many IT users lack the understanding of privileged accounts. Inside this white paper uncover how outside attackers or malicious insiders can exploit vulnerabilities and find steps to the anatomy of a privileged account hack.

  • Strategies for Securing Applications from Vulnerable Open Source Components

    Sponsored by: Veracode, Inc.

    90% of an application is typically made up of third-party components, making users extremely vulnerable to security risks. In this white paper, learn about hidden vulnerabilities and targets in applications and reveal 5 ways you can use applications without adding risk.

  • From the Top: What Executives Need to Know About Cybersecurity

    Sponsored by: Kaspersky Lab

    $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.

  • How Veracode Supports your Complete Application Security Program

    Sponsored by: Veracode, Inc.

    Application layer attacks are now the most frequent pattern in confirmed breaches, according to Verizon. Every organization is dependent on applications – if these applications are at risk, so is the business. In this white paper uncover how to boost your application security effectively.

  • Veracode Integrations

    Sponsored by: Veracode, Inc.

    As more organizations move to DevOps, application security needs to keep up or risk being left behind. Access this white paper to learn how you can integrate your application security with your security and development teams' existing tools and processes.

  • The Fight Against Ransomware

    Sponsored by: Sophos, Inc.

    Endpoint security has reached a tipping point. Ransomware is expected to generate $1B+ in profit this year. Gain insight into a ransomware strategy and how endpoint security has changed overtime by watching this webcast.

  • IT Security: Cost Center or Strategic Investment?

    Sponsored by: Kaspersky Lab

    Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.

  • The Security Professional's Role in a DevSecOps World

    Sponsored by: Veracode, Inc.

    A National Institute of Standards and Technology study found that it is 6 times more costly to fix vulnerabilities in production vs. during coding. In this white paper, gain insight into how DevSecOps is the future of software development.

  • Comparing the Best SIEM Systems on the Market

    Sponsored by: TechTarget

    SIEM adoption is on the rise. The global SIEM market will grow to $4.5+ billion in 2019, according to Markets and Markets. Cybersecurity Ventures CEO Steve Morgan predicts a big uptick in SIEM adoption by SMBs in the next few years.

  • Synchronized Security: Best-of-breed defense that's more coordinated than attacks

    Sponsored by: Sophos, Inc.

    Today's attacks are more sophisticated and coordinated than ever. According to ESG Group, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.

  • GDPR will bring the Teeth that have been Missing in Data Security Auditing and Compliance

    Sponsored by: SyncDog

    Data security standards have been around for decades yet standards enforcement has been lacking. This paper identifies 5 steps to help maintain compliance leading up to GDPR.

  • SyncDog Metropolitan Police Department Case Study

    Sponsored by: SyncDog

    In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.

  • Beginner's Guide to Ransomware Detection and Protection

    Sponsored by: AlienVault

    Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.

  • Don't Let Legacy Security Tools Hold Up PCI Compliance in the Cloud

    Sponsored by: CloudPassage

    Explore the top challenges of using traditional PCI security controls in a cloud environment. Learn how you can automate cloud compliance with the Payment Card Industry Data Security Standard.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.