ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Secure, Cloud-Managed Wifi

    Sponsored by: WatchGuard Technologies, Inc.

    In this white paper, learn how to implement Wi-Fi in safe, protected airspace without the normal administrative headaches.

  • Focus: Securing for the future

    Sponsored by: ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Malware Prevention vs. Detect and Respond

    Sponsored by: Dell India

    Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.

  • Insights Into How Math Can Defeat Malware

    Sponsored by: Dell India

    Malware has always evolved faster than security measures could keep up...until now. Access this white paper to learn about a math and machine-learning approach that enables you to identify potential threats based on mathematical risk factors, so that you can make the right decisions in real time.

  • Trustwave Global Security Report

    Sponsored by: SingTel

    Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.

  • 2016 Security Pressures Report

    Sponsored by: SingTel

    The recommendations in this resource can serve as a reliable compass for where your security efforts need to be going into the future. These best practices will not only placate security pressure, but also help make your organization more secure overall.

  • IoT Strategy: 8 Key Questions to Ask

    Sponsored by: Cisco Systems, Inc.

    IoT introduces tremendous risk if the connected products and services are not designed, deployed and supported properly. The 8 questions presented in this white paper provide a step-by-step approach for turning an IoT vision into reality.

  • Protecting the 3 Areas of Secure Mobility

    Sponsored by: BlackBerry

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

  • Best Practices for Healthcare Data Breach Prevention

    Sponsored by: Absolute

    As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.

  • Computer Weekly: Data Danger

    Sponsored by: ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

  • How to Identity Web Threats in Real-Time

    Sponsored by: Blue Coat Systems

    Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.

  • Secure and Accelerate User Access to Web Applications

    Sponsored by: Blue Coat Systems

    Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.

  • Deliver Complete Security for Enterprise Web Applications

    Sponsored by: Blue Coat Systems

    Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: KnowBe4

    This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.

  • A New Trend in Agile - Incorporating Program Management

    Sponsored by: Global Knowledge

    How can organizations in diverse industries continue to use familiar waterfall practices and at the same time be more Agile? The answer is to use Agile program management - learn more about these principles inside.

  • How to Transform Employee Worst Practices Into Enterprise Best Practices

    Sponsored by: KnowBe4

    Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.

  • The Phishing Breakthrough Point

    Sponsored by: KnowBe4

    Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.

  • Employees at the Frontline in the Battle Against Ransomware

    Sponsored by: KnowBe4

    In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.

  • How Multi-Vendor DNS Can Protect Your Internet Presence

    Sponsored by: Dyn

    In 2016, the DDoS attack on Dyn shined a light on the inherent vulnerabilities within the internet that were never in the forefront for many IT teams, until now. Access this webinar to learn from Dyn's vulnerabilities and the value of a secondary, multi-vendor DNS strategy for resilience within your infrastructure.

  • Ransomware: Mitigating the Threat

    Sponsored by: Zerto

    Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling effects don't threaten your business.

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.

  • Buyers guide to cloud based I&M mgmt

    Sponsored by: IBM

    Learn how to make the most informed decision about your next enterprise grade IDaaS provider with this interactive buyer's guide.

  • The Current State of Data Protection in Midsize Organizations

    Sponsored by: arcserve

    Discover why and how IT security strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: Fortinet, Inc.

    What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.

  • The Rise of Fileless Malware Attacks

    Sponsored by: Fortinet, Inc.

    This expert e-guide looks at how fileless malware works, how it's becoming more sophisticated, and what you can do to protect yourself from such threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.