ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You

    Sponsored by: ThreatConnect

    Examine how you can enhance your SIEM tool with a cybersecurity platform to take control of the data chaos, gain a fuller understanding of threats, eliminate false positives, and form a proactive and intelligence-driven defense.

  • Securing the Unpatchable

    Sponsored by: Palo Alto Networks

    Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.

  • Protect Yourself From Antivirus

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • PwC: A Security Framework for Business Leaders

    Sponsored by: Palo Alto Networks

    Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.

  • Outsmarting Ransomware: Protect Your Money and Assets

    Sponsored by: arcserve

    Watch this highly informative webinar featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.

  • The Future of Enterprise Mobile Security: Predictions for 2016 and Beyond

    Sponsored by: Lookout

    Understanding and successfully combatting security threats that mobility creates is paramount for continued protection of sensitive company and customer data. This white paper provides Lookout's mobile cybersecurity predictions for 2016 to 2019, so you can futureproof your enterprise.

  • How to Detect a Ransomware Attack Before it's too Late

    Sponsored by: LogRhythm, Inc.

    Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.

  • What's the Best Way to Handle External Security Auditors?

    Sponsored by: Dell Software

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

  • 4 Ways Neustar Strengthens your DNS Security

    Sponsored by: Neustar

    The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.

  • DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us

    Sponsored by: Neustar

    Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.

  • How are Banks Fighting the War on Fraud

    Sponsored by: Neustar

    Discover how banks are fighting fraud, the amount of import they put on fraud and what they deem are the biggest impacts of fraud on their organization. Learn what to look for in an anti-fraud solution to balance security and customer convenience perfectly.

  • 2016 Security Operations Center Report

    Sponsored by: Neustar

    This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.

  • 2016 Neustar DDoS Attacks & Protection Report

    Sponsored by: Neustar

    This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.

  • Importance of Incident Response Collaboration

    Sponsored by: Dimension Data

    This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.

  • Nucleus Research Guidebook: Benefits of Cloud-Based SIEM

    Sponsored by: IBM

    In this Nucleus Research guidebook, learn how deploying a cloud-based security information and event management (SIEM) tool can help you achieve strong security while keeping costs down.

  • Operationalize Security to Patch Vulnerabilities

    Sponsored by: BMC

    This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.

  • Here's What Your Personal Data is Going for on the Dark Web

    Sponsored by: BMC

    How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.

  • Cloud Services Take Off, GRC Doesn't

    Sponsored by: SearchSecurity.com

    The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.

  • 2016 Cost of Data Breach Study: Global Analysis

    Sponsored by: IBM

    This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.

  • Information Security Consulting Services Report

    Sponsored by: IBM

    This Forrester report evaluates the 13 most significant information security consulting service providers against a set of 31 criteria. Uncover how well these consultancies fulfill the criteria and where they stand in relation to each other.

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • The Case for Security Intelligence Services, Hosted from the Cloud

    Sponsored by: IBM

    Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.

  • Trends in SAP Cybersecurity

    Sponsored by: IBM

    The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices

    Sponsored by: Lenovo Software

    This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.

  • Compliance - The New Hot Button for CIOs

    Sponsored by: VMware

    This informational white paper identifies the main purpose of compliance regulations, some of the risks that accompany enterprises who fail compliance audits, and reviews the best practices to ensure you have the right partner to meet your compliance requirements.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.