Research Library

Powered by

Risk Management Research

  • Windows 10: If Compatibility is Not a Problem, What Is?

    Sponsored by: Flexera Software

    Explore this white paper to gain insight into the security challenges of adopting Windows 10 and how to reduce risks when implementing and using the software.

  • 25 Simple Yet Overlooked Ways to Booster Your Ethics & Compliance Program

    Sponsored by: Navex Global

    Access this e-book to uncover a 25-step guide to boosting your compliance and ethics program by improving culture, getting better connected with employees and boosting program awareness.

  • Get Shadow Data Under Control

    Sponsored by: Symantec

    A new era of information security is dawning. According to TechCrunch, by 2020 we'll have 6.1 billion smartphone users. With this connectivity, sharing data over the internet can be hazardous. Access this infographic to learn about the challenges and risks with data and how GDPR could be the answer to helping improve your security.

  • What Every CISO Needs to Know About Cyber Insurance

    Sponsored by: Symantec

    The impact of a cyberattack to an organization's brand, reputation, and business operations can be catastrophic. Access this white paper to learn about why the implementation of cyber insurance can help improve your security posture and mitigate your risks of a cyberattack.

  • Get Smart About Cloud Security

    Sponsored by: Oracle

    The average cost of a data breach to a company is $3.5 million. This infographic provides helpful clues to advance your cloud security to mitigate the risks of encountering data breaches and other malicious attacks.

  • Cloud Security: The 5 Fears

    Sponsored by: UKFast

    With cloud security on the tip of everyone's tongue, which fears are justified? Which can be mitigated? Which are just overplayed? And what's changing in the cloud landscape? This white paper offers 5 fears of cloud security along with best practice checklists to ensure proper security measures are taken.

  • How to Get More Personal Data Without the Risk

    Sponsored by: Evident

    According to Continuum, 3.7 million personal data records are stolen every day. Take an in-depth look at this webinar to gain insight into the worsening security problem facing enterprises today, the concern about safety of personal data, and tips for choosing a verification partner.

  • 4 Questions Every Information Security Leader Must Answer

    Sponsored by: Symantec

    As a leader of security within your organization, it's your job to combat attacks and mitigate the damage. This e-book offers 4 questions every information security leader must answer to determine the strength of your organization's security across every stage of an attack lifecycle.

  • Fighting Against Authorized Push Payment (APP) Scams

    Sponsored by: HID Global

    This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.

  • Staying Secure is All About Keeping One Step Ahead

    Sponsored by: BT

    With the dramatic explosion of cyberattacks, it is necessary to constantly monitor for threats rather than reacting to them after the fact. This brief webcast offers strategies of staying one step ahead of the next security threat, in order to give your enterprise the security it needs.

  • Securing the Digital Enterprise

    Sponsored by: BT

    Cybersecurity dominates the media and the chances of a business or an individual becoming a victim have never been greater. This white paper provides a practical guide to organizations on their journey to using security as a business enabler as well as offering useful checklists for those who are already on their journey to protection.

  • Buyer's Guide: Cybersecurity

    Sponsored by: Palo Alto Networks

    Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.

  • DDoS Overview: Keeping the Web Open for Business

    Sponsored by: BT

    41% of global organizations surveyed by BT experienced a DDoS attack last year, with 78% hit more than once. Watch this DDoS attack overview webcast to gain insight into the basics of DDoS attacks and how you can protect your organization with the best protection strategy for your needs.

  • Secure Communications for a Safer World

    Sponsored by: BT

    This case study provides a concrete example of how network security within UK government departments was enhanced with a secure communications strategy. Discover how this approach made processes more agile and efficient, while meeting the most stringent security requirements.

  • Security Roundup: The Cost of Compromise

    Sponsored by: TrendMicro

    Oftentimes, incidents can be attributed to lapses in security within companies, and a failure to secure systems is far-reaching and expensive. This security roundup provides a review of the data and trends set by relevant current events, specifically focusing on WannaCry and Petya ransomware, the IoT botnet Persirai, and business email compromise.

  • DDoS Trends Report

    Sponsored by: Corero Network Security

    In Q3 of 2017, Corero customers experienced an average of 237 DDoS attacks per month, which is an increase of 35% compared to Q2. This DDoS Attack Trends Report offers DDoS statistics, patterns, attack types, and key insights in order to help you protect your enterprise against these sophisticated attacks.

  • The Sharing Economy: Who Will You Trust

    Sponsored by: Evident

    With the evolving digital world, it is challenging to secure personal data and maintain an identity management platform. Explore this white paper to gain a deeper understanding of how you can improve your IAM strategy within the sharing economy in order to protect and secure your data.

  • Turning DDOS from a Cost Center to a Revenue Generator

    Sponsored by: Corero Network Security

    According to IDC, worldwide spending on DDoS protection will reach over $1 billion by 2019. In this e-book, learn how to protect your organization from DDoS attacks, in addition to understanding how to gain a revenue opportunity.

  • Check Point and Silver Peak Securing the Internet for SD-WAN

    Sponsored by: Silver Peak

    Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.

  • Smart Prevention: Expect the Unexpected

    Sponsored by: BT

    As attackers become increasingly creative, reaching corporate resources with ever-more complex attacks, enterprises are drowning in detected and undetected issues. This white paper provides insight into preventing security threats proactively, rather than reacting once you have already been attacked.

  • Achieve Security and Compliance in the Cloud Without Breaking the Bank

    Sponsored by: Alert Logic

    Take a closer look at this infographic to uncover how IT professionals from 4 large sized companies implemented a security-as-a-service approach without breaking the bank.

  • How to Handle a Ransom Driven DDoS Attack

    Sponsored by: Corero Network Security

    Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.

  • Compliance: Unlocking the Data that Matters

    Sponsored by: BT

    Improving the safety and resilience of the financial markets, along with fighting financial crime, has risen to the top of companies' agendas. In this white paper, uncover compliance challenges for risk teams in the financial sector as well as ways to gain compliance while maintaining the safety of clients' information.

  • Data + Security = A Most Unvirtuous Relationship

    Sponsored by: Delphix

    Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.

  • The Hunt for IoT

    Sponsored by: F5 Networks

    30.6 million IoT brute force attacks were launched from January 1 to June 30 2017. This white paper provides an analysis of data collected pertaining to the rise of thingbots across the globe, specifically focusing on the Mirai and Persirai bots containing destructive malware.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.