ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Securing the Private Cloud

    Sponsored by: Fortinet, Inc.

    The demands on private cloud all too often leave operators in a position of favoring performance and agility over security. This white paper details how you can protect your private cloud environment by building security into the network that can accommodate powerful threat detection technologies while maximizing throughput and flexibility.

  • Effectively Manage Application Security Risk in the Cloud

    Sponsored by: IBM

    Discover why application security is so important, why organizations struggle to achieve it and what effective application security looks like.

  • Next Level Threats: Stopping Ransom & CEO Email fraud

    Sponsored by: Trustwave

    Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.

  • Cb Defense: PCI DSS Anti-Virus Assessment

    Sponsored by: Carbon Black

    This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.

  • Ultimate Guide to Application Security

    Sponsored by: Veracode, Inc.

    Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.

  • The Rise of Ransomware

    Sponsored by: Barracuda Networks

    Discover eye-opening statistics about the ever-increasing ransomware problems against today's enterprises. Learn what types of attacks are taking place, where these attacks are taking place and what you can do to best protect your organization from financial and brand name disaster.

  • Disaster recovery and business continuity: Essential guide

    Sponsored by: ComputerWeekly.com

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

  • 10 Tips to Stay Safe Against Ransomware and Advanced Threats

    Sponsored by: Barracuda Networks

    Your organization, no matter the size or industry, is now a target for ransomware, phishing, and advanced persistent threats. But there's a lot you can do to reduce the risk. Download this white paper now and discover 10 tips for preventing these attacks.

  • DraftKings Replaces Traditional Antivirus with Next-Gen AV (NGAV)

    Sponsored by: Carbon Black

    Discover how DraftKings went about finding a comprehensive next-generation antivirus solution that wouldn't impact business operations. While DraftKings evaluated over 100 different providers, only one allowed them to continue working as normal, while protecting their network in the background.

  • IT Security 101: Thinking Like a Cybercriminal?

    Sponsored by: Solarwinds MSP

    Understanding how the threat landscape is maturing means getting to grips with how cybercriminals think. This e-book illustrates 6 key considerations for bolstering cybersecurity. Download it now to establish an effective system to proactively address potential threats across the entire cyber landscape.

  • Can One Enterprise Firewall Tool Protect Your Entire Network?

    Sponsored by: Fortinet, Inc.

    Discover how to protect your entire attack surface, from IoT to cloud and from users to data, behind a single pane of glass. Learn why one network security operating system could be all you need to ensure end-to-end network protection against today's most advanced security threats and targeted attacks.

  • DDoS: A Clear and Present Danger

    Sponsored by: A10 Networks

    Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.

  • The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector

    Sponsored by: A10 Networks

    In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.

  • Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy

    Sponsored by: Barracuda Networks

    This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Gain the best practices for restricting malicious software.

  • Ransomware and Phishing: How to Avoid Falling Victim to These Threats

    Sponsored by: Barracuda Networks

    Discover how to gain complete visibility, control and protection against malware, spyware, phishing, spear phishing and ransomware threats. Learn how to adequately secure all of your threat vectors and proactively stay ahead of the latest threats with an intelligent backend infrastructure.

  • DDoS Attacks Are On The Rise – And Fatal to Most Businesses

    Sponsored by: Arbor Networks

    This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.

  • Reviewing a Year of Serious Data Breaches, Major Attacks and New Vulnerabilities

    Sponsored by: IBM

    Discover which industries were hit hardest in 2015 and what these attacks mean for the future. Learn what steps you can take to prepare your security plan for growing threats in 2016 and beyond.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • QRAT Malware-As-A-Service

    Sponsored by: Booz Allen Hamilton

    QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.

  • Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel

    Sponsored by: Booz Allen Hamilton

    Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • What are Threat Intelligence Services?

    Sponsored by: Unisys

    To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.