ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Employing Cyber Threat Intelligence

    Sponsored by: Anomali

    Cyber threat intelligence is fast becoming a cornerstone in enterprise security but are you using your various intelligence feeds most effectively? Learn how organizations large and small are increasingly adding threat intelligence to their security posture and see what type of attacks you can mitigate using threat intelligence.

  • Timeline of Disruption- A history of disrupting the business of hacking

    Sponsored by: Hewlett Packard Enterprise

    Learn about the history of enterprise security: from its conception until today. See how hacking has disrupted business innovation over the years and understand why your organization must continue to innovate fearlessly.

  • Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting

    Sponsored by: Proofpoint, Inc.

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • Case Study: How Republic Bank Monitors, Protects Sensitive Data

    Sponsored by: Imperva

    See how a national bank managed 100% uptime over a three-year period and ensured compliance across all servers in all locations. Learn how you can leverage behavioral analytics to mitigate risk and ensure that unauthorized personnel do not access sensitive client information.

  • How business innovations meet the business of hacking

    Sponsored by: Hewlett Packard Enterprise

    Hackers are sophisticated but what does that mean for your business? Explore the business of hacking. Discover the different ways cybercriminals make money, their motivations and different hacking organizations.

  • Axway SecureTransport Enhanced Managed File Transfer Gateway

    Sponsored by: Axway

    Handle everything from high-volume automated file transfers between systems, sites and lines of business to user-driven communications and mobile file sharing. Ensure you're ready for high-growth uses cases while maintaining corporate controls and visibility.

  • Removing Malware and Undetectable Windows AppLocker

    Sponsored by: Check Point Software Technologies Ltd.

    A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.

  • Log Monitoring & Analysis: Strengthen Information Security While Respecting User Privacy

    Sponsored by: Intersect Alliance

    Log monitoring and analysis tools can be used to bolster information security and improve incident response without infringing on user privacy. In this expert e-guide, security pros evaluate options based on criteria such as alerts and reporting capabilities.

  • Healthcare CIOs Share Cybersecurity Best Practices

    Sponsored by: Symantec Corporation

    Cybersecurity is on everyone's mind in health IT. At HIMSS 2016, we spoke with 4 CIOs who provided advice on best practices and technologies you can (and should) implement to protect your organization from healthcare cybersecurity vulnerabilities.

  • Lighting a Path to PCI Compliance

    Sponsored by: Illumio

    Adaptive Security Platforms (ASP) can ensure PCI compliance and audit preparation across a wide spectrum of standards. Read on to uncover how your enterprise can protect cardholder data, implement strong access control measures, maintain an information security policy, and more.

  • Putting the “Secure” in Secure Remote Access

    Sponsored by: Citrix

    Security pros today are challenged to establish comprehensive protection for all kinds of remote access use cases – but it isn't impossible. Learn how you can deliver a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.

  • Recognize Your Security Shortcomings and Address Them with Confidence

    Sponsored by: Dell, Inc.

    This e-guide highlights the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.

  • Connected Medical Devices Meet FDA Scrutiny

    Sponsored by: Symantec Corporation

    Cybersecurity threats to medical devices are a growing concern, particularly in the new era of IoT. Discover the FDA-recommended steps that manufacturers and users of connected medical devices should take to ensure cybersecurity.

  • Most Effective Security Technologies and Practices

    Sponsored by: Hewlett Packard Enterprise

    Discover how understanding the business of hacking and how cybercriminals profit can help you develop a successful security strategy.

  • Security Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.

  • The State of Incident Response

    Sponsored by: ServiceNow

    Take a close-up look at the current practices and challenges associated with incident response processes and technologies. Browse through tips from IT leaders to guide your security framework.

  • Make Emm Part Of a Broader Mobile Enterprise Strategy

    Sponsored by: Microsoft

    If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.

  • Internet of Things: Enterprise Risks, Platform Options to Consider

    Sponsored by: Xively by LogMeIn

    The Internet of Things (IoT) increases the number of security risks businesses face, becoming a backdoor for attackers into the enterprise. Discover 7 key security risks associated with IoT and how to manage them. Plus learn how robust cloud platforms will allow IoT to reach its potential.

  • What Healthcare Executives Must Know About Data Breaches

    Sponsored by: Coalfire

    BYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.

  • How to Secure your Growing Mobile Workforce Step-By-Step

    Sponsored by: Intel Security

    When it comes to mobile security, the first step is to understand the data and content you own. This e-guide helps you figure out your mobile data management plan to facilitate your growing mobile workforce. Learn step-by-step how to reconfigure your current information architecture and how to add new DLP technologies.

  • 7 Critical Capabilities for Enterprise Information Archiving

    Sponsored by: Proofpoint, Inc.

    This Gartner Report helps you understand and compare the critical capabilities of the enterprise information archiving solutions available in today's market.

  • Fraud risk engines strike back

    Sponsored by: IBM

    Discover how to approach fraud detection in a new way. You must base your stance on three core principles —visibility, a global threat intelligence network, and agility by design. By using this approach, you can significantly reduce the number of false positives and can improve customer satisfaction.

  • Fraud protection doesn't have to be an uphill battle

    Sponsored by: IBM

    You can simplify the fraud protection process while reducing time and cost. Learn how to achieve greater visibility and adaptability across the fraud management lifecycle and discover highly effective intelligence- and evidence-based fraud detection with fewer false positives.

  • Cyber Risk Report 2016 Executive Summary

    Sponsored by: Hewlett Packard Enterprise

    In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.

  • Behind the Mask: The Changing Face of Hacking

    Sponsored by: Hewlett Packard Enterprise

    This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.