ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Red Hat Product Security Risk Report 2015

    Sponsored by: Red Hat

    Tools that detect and address critical vulnerabilities before they go public are crucial to empowering developers. Explore reasons you should implement open source tools with security in mind.

  • 6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team

    Sponsored by: ThreatConnect

    This paper outlines 6 steps you can take to prioritize threat data, automate manual tasks, and streamline your workflow. With the right tools in place, you can turn your small band of brothers into an army suited to take down all of today's sophisticated threats.

  • IT Security for Retail

    Sponsored by: Trustwave

    This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.

  • Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader

    Sponsored by: Digital Guardian

    The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.

  • IT Security for Financial Sector

    Sponsored by: Trustwave

    Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next $50 million mistake.

  • Best Practices for Managing 'Insider' Security Threats, 2014 Update

    Sponsored by: Imperva

    Read Gartner's Best Practices for Managing 'Insider' Security Threats and get threat prevention strategies to protect your enterprise from security breaches by internal users. Learn what drives these attacks such as the prevalence of bring your own device (BYOD) and cloud.

  • Prevention Is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence

    Sponsored by: Imperva

    Now is the time to move toward people-centric and pervasive monitoring strategies to future-proof your organization. Read Prevention is Futile in 2020 by Gartner to discover four critical shifts organizations need to implement to stay vigilant.

  • 7 Best Practices to Secure Your Data on AWS

    Sponsored by: Rackspace

    This webinar features two AWS-certified professionals who will help you understand how to secure your data on the AWS platform. They will discuss seven best practices for securing data at rest and how those strategies can decrease your risk of a catastrophic data leak.

  • 2016 Security Pressures Report

    Sponsored by: Trustwave

    The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.

  • 3 Steps to Create a Data Protection Lifecycle Management Strategy

    Sponsored by: Iron Mountain

    Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.

  • Security and Innovation Converge at Open Source Linux

    Sponsored by: Red Hat

    Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.

  • Migration Best Practices for Red Hat Enterprise Linux

    Sponsored by: Red Hat

    As IT systems age, they become more brittle. Download this white paper to understand the benefits of adopting the latest release of Red Hat Enterprise Linux—which will mitigate risk in the lifecycle of your server platform, and decrease the vulnerability of systems to security threats.

  • BYOD and mHealth: Navigating Security and HIPAA

    Sponsored by: Optum

    BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.

  • Ransomware: Profitable for Criminals, Hard to Stop for Enterprises

    Sponsored by: ExtraHop

    Can your traditional approaches to security keep up with the bad guys? Learn a more behavior-based approach to detecting ransomware. Discover how this security strategy can grant you better visibility into your environment so you can determine where malware is and where it's been.

  • 4 Cybersecurity Trends that Might Be Affecting Your Organization

    Sponsored by: Navex Global

    In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.

  • Security Tips for HIPAA-Compliant Cloud Storage and Texting

    Sponsored by: Optum

    Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.

  • Understand the Hype around Mobile Data Security Threats

    Sponsored by: Check Point Software Technologies Ltd.

    In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.

  • Major Global Bank Secures Their Mobile Applications

    Sponsored by: Arxan

    Learn how a major global banking leader was able to pave the way for mobile banking security to protect critical cryptography and authentication routines in their app that manages communication with the banking server.

  • Stop Future Threats though Careful Examination of the Malware Lifecycle

    Sponsored by: Check Point Software Technologies Ltd.

    This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.

  • Asset Management Firm's Switch to Caché From a Relational Database Improves Performance, Reduces Risk

    Sponsored by: InterSystems

    In this case study, explore how a global asset management firm based in Boston, MA transitioned from a relational database to Caché to help mitigate investment, operational, and technological risk. Tap into how they increased flexibility and reliability, boosted database performance, and more.

  • Cybersecurity Moves Toward Hybrid Models

    Sponsored by: Dell SecureWorks

    Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.

  • HIPAA Compliance & Risk Management

    Sponsored by: Armor

    Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.

  • Are You a Security-First Organization?

    Sponsored by: Armor

    Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.

  • Securing the Connected Car Ecosystem

    Sponsored by: Arxan

    Discover how this leading automaker was able to protect their Connected Car environment to mitigate never before seen security risks and stop hackers from injecting malicious code into customers' vehicles.

  • See How Apps are Being Hacked

    Sponsored by: Arxan

    This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.