ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • 7 Key Factors of a Highly Effective Application Protection Solution

    Sponsored by: Arxan

    An effective application protection strategy is paramount to safeguarding the integrity and confidentiality of an application. This white paper discusses the 7 key factors that enable effective application protection, mitigating binary code risks and combating the latest security threats.

  • Top 10 Zero-Day Exploits of 2015

    Sponsored by: Palo Alto Networks

    This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits in brief case studies.

  • Privileged Users

    Sponsored by: Forcepoint

    Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.

  • Defeating the Threat Within

    Sponsored by: Forcepoint

    Your critical data can be stolen by someone who interacts with your network daily. You need the right plan before it happens. Learn about the new wave of insider threats and start planning now.

  • ROI for Threat Intelligence

    Sponsored by: ThreatConnect

    Not all intelligence is created equal. Learn how to make informed decisions about threat intelligence (TI) for your particular organization. Done right, you can sharpen your defenses, save time, and make better strategic decisions on your security using TI.

  • Breach response: It's about keeping your customers safe

    Sponsored by: AllClear ID

    Learn how to deliver a timely, organized breach response that boosts customers' confidence, repairs customers' identities if they've been victimized and helps minimize irreparable damage to your brand. Ensure peace of mind by giving your assurance that your organization values both their identities and their loyalties.

  • Breach response isn't about losing data. It's about keeping your customers.

    Sponsored by: AllClear ID

    The time to prepare for a data breach is today. Give your customers reassurance that they are taken care of and help resolve any harm done to their identity. Learn how to respond to customer queries effectively and reduce customer response time for any size breach to as little as 48 hours.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Building a Vendor (IT) Risk Management Program

    Sponsored by: BitSight

    Understand a vendor's security posture without requiring expensive site visits and penetration tests. Assess your vendors more frequently and focus efforts on those who have serious security issues.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover Webcast

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.

  • Komerční bankaReducing logins from malware-infected endpoints by90 percent in just three months

    Sponsored by: IBM

    Learn about KB's security struggles and how they were able to mitigate malware attacks with advanced fraud and malware protection. They are now able to detect, block and remediate infections and detect phishing threats before damage can be done to their enterprise.

  • HITRUST CSF Certification – Frequently Asked Questions

    Sponsored by: Coalfire

    What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • Breach Response: Preparing for the Threat; Controlling the Chaos

    Sponsored by: AllClear ID

    Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyberattack, and the key features of a successful incident response plan. Discover how to emerge from every data breach with an enhanced public image of responsibility and competence.

  • Illuminating the Real Cost of Incidents from an Insurer's Perspective

    Sponsored by: AllClear ID

    This study helps you understand the true impact of data insecurity and the real cost of incidents by consolidating claims data from multiple insurers.

  • The Cost of Unintentional Insider Threat

    Sponsored by: Forcepoint

    A high rate of Unintentional Insider Threats (UIT) sheds light on the demands of today's workplace culture in the United States. Work cultures are unlikely to change anytime soon, but there are tools and programs that can help any work environment with a UIT problem. To find out more, read the report.

  • Security Performance Metrics Across Major World Economies

    Sponsored by: BitSight

    This report shows you the security performance results of 250 organizations per country from the U.S., the U.K., Singapore, Germany, China and Brazil during May 2015 until May 2016. Discover how to help your organization's security stance as you move forward into new, global markets.

  • Don’t Let “Trusted” Vendors Become Cyber-Breach Enablers

    Sponsored by: BitSight

    This resource uncovers how evaluate vendors' security ratings simply and effectively. Learn how to police the safety of the vendors entrusted with handling your sensitive data to enhance your vendor risk management program no matter where it is on the maturity curve.

  • Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.

  • Why Traditional Security Approaches Fail

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure. Uncover 4 key areas to focus on when implementing a new, more efficient security strategy.

  • UK’s Hottest Banking FraudSchemes

    Sponsored by: IBM

    Leading cybersecurity authority Limor Kessem teaches you top fraud threats to UK banking institutions and the impact cybercrime is having on them today. You'll learn top cybercrime trends and the scale at which these practices are growing.

  • Hackers Aren't As Picky As You Think

    Sponsored by: Verizon

    Discover the first truth of network security: Malicious actors are mostly out for low-hanging fruit. With the resource found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.