ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Enhance Your Security & Compliance for Amazon Web Services

    Sponsored by: CloudPassage

    As enterprises move applications from traditional data centers to a public or hybrid cloud environment, the security model needs to change. This white paper explores how you can boost your AWS security to keep up with this change.

  • Proofpoint Threat Response

    Sponsored by: Proofpoint, Inc.

    How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.

  • Architecting for HIPAA Security and Compliance on Amazon Web Services

    Sponsored by: Amazon Web Services

    AWS customers with HIPAA compliance requirements have a great deal of flexibility in how they meet encryption requirements for PHI. In this white paper, uncover HIPAA privacy and security rules and learn techniques for meeting compliance requirements.

  • Preparing for the Big One: General Data Protection Regulation

    Sponsored by: Smarsh

    Even if your organization is not physically located in the EU, the GDPR will most likely affect you as well. In this white paper, gain insight into GDPR requirements and what your organization must do to comply.

  • Strategies for API Security

    Sponsored by: Akamai Technologies

    APIs provide transparency to the internal structure of applications and provide granular access to an application's backend, making online businesses more vulnerable than ever before to cyberattack threats. This white paper outlines the most common types of cyberattacks and offers strategies for protecting APIs.

  • Top 5 Security Challenges Brought on by Mobile and Cloud

    Sponsored by: Entrust, Inc.

    50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.

  • The Top 5 Myths of Data Breaches

    Sponsored by: FireMon

    Debunking myths is an important step to improve the effectiveness of security defenses against future breach attempts. This white paper discloses who and what is at risk of a data breach and reveals the top 5 myths of data breaches.

  • Planning Considerations for Compliance with GDPR

    Sponsored by: FireMon

    If you haven't started your GDPR journey yet, now is the time. In this white paper, read about planning for GDPR compliance so that your organization does not fall victim to harsh fines.

  • Anatomy of a Privileged Account Hack

    Sponsored by: Thycotic

    Cybersecurity affects more than 3.6 billion internet users worldwide and 80% of hackers say humans are the most responsible. Many IT users lack the understanding of privileged accounts. Inside this white paper uncover how outside attackers or malicious insiders can exploit vulnerabilities and find steps to the anatomy of a privileged account hack.

  • Strategies for Securing Applications from Vulnerable Open Source Components

    Sponsored by: Veracode, Inc.

    90% of an application is typically made up of third-party components, making users extremely vulnerable to security risks. In this white paper, learn about hidden vulnerabilities and targets in applications and reveal 5 ways you can use applications without adding risk.

  • From the Top: What Executives Need to Know About Cybersecurity

    Sponsored by: Kaspersky Lab

    $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.

  • How Veracode Supports your Complete Application Security Program

    Sponsored by: Veracode, Inc.

    Application layer attacks are now the most frequent pattern in confirmed breaches, according to Verizon. Every organization is dependent on applications – if these applications are at risk, so is the business. In this white paper uncover how to boost your application security effectively.

  • Veracode Integrations

    Sponsored by: Veracode, Inc.

    As more organizations move to DevOps, application security needs to keep up or risk being left behind. Access this white paper to learn how you can integrate your application security with your security and development teams' existing tools and processes.

  • The Fight Against Ransomware

    Sponsored by: Sophos

    Endpoint security has reached a tipping point. Ransomware is expected to generate $1B+ in profit this year. Gain insight into a ransomware strategy and how endpoint security has changed overtime by watching this webcast.

  • IT Security: Cost Center or Strategic Investment?

    Sponsored by: Kaspersky Lab

    Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.

  • The Security Professional's Role in a DevSecOps World

    Sponsored by: Veracode, Inc.

    A National Institute of Standards and Technology study found that it is 6 times more costly to fix vulnerabilities in production vs. during coding. In this white paper, gain insight into how DevSecOps is the future of software development.

  • Synchronized Security: Best-of-breed defense that's more coordinated than attacks

    Sponsored by: Sophos

    Today's attacks are more sophisticated and coordinated than ever. According to ESG Group, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.

  • GDPR will bring the Teeth that have been Missing in Data Security Auditing and Compliance

    Sponsored by: SyncDog

    Data security standards have been around for decades yet standards enforcement has been lacking. This paper identifies 5 steps to help maintain compliance leading up to GDPR.

  • SyncDog Metropolitan Police Department Case Study

    Sponsored by: SyncDog

    In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.

  • Beginner's Guide to Ransomware Detection and Protection

    Sponsored by: AlienVault

    Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.

  • Don't Let Legacy Security Tools Hold Up PCI Compliance in the Cloud

    Sponsored by: CloudPassage

    Explore the top challenges of using traditional PCI security controls in a cloud environment. Learn how you can automate cloud compliance with the Payment Card Industry Data Security Standard.

  • Top 10 Ways to Achieve Agile Security

    Sponsored by: CloudPassage

    From the barrage of cyberattacks on enterprises to new threat vectors within networks due to the move to the cloud, CIOs and CISOs have more to consider around cybersecurity than ever before. Check out this brief albeit enlightening guide that reveals the 10 fundamental steps to help you get started on your own path to agile security nirvana.

  • The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure

    Sponsored by: Google Cloud

    Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.

  • Organizations Worldwide Fear GDPR Non-Compliance Could Put Them Out of Business

    Sponsored by: Veritas

    On average, firms are forecasting spending in excess of €1.3m ($1.4M) on GDPR readiness initiatives. Take a look at this infographic to reveal statistics regarding the GDPR deadline, including potential GDPR fallout, lack of technology hindering GDPR compliance, and more.

  • The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime

    Sponsored by: Kaspersky Lab

    According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.