Research Library

Powered by

Security Research

  • When Your IAM Policy Encounters the Internet of Things

    Sponsored by: Unisys

    Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.

  • The Incident Response Makeover Guide

    Sponsored by: Exabeam

    Learn how to make over stalled-out incident response programs with SOC automation, utilize advanced behavior analytics, and amplify the power of your security analysts in order to reap the benefits of boosted ROI, data loss prevention, and lightning-fast incident response.

  • Unify Security Intelligence to Create a Strong Threat Detection and Prevention Ecosystem

    Sponsored by: LogRhythm, Inc.

    In this white paper by Dr. G.W. Ray Davidson, discover how you can unify your security intelligence processes through automation and integration. Learn how you can develop a classification scheme to determine what data is most important to protect, expand this risk scoring to all areas of your enterprise, and more.

  • The Biggest Cyber Threat Facing Businesses Today

    Sponsored by: Agari

    Business email compromise (BEC) scams are by no means a new phenomenon. But as these scams become more sophisticated, it becomes even more important to stay up to date with the latest types of attacks to evolve out of BEC. Discover a proactive approach to risk management that will help protect your business against these advanced phishing attacks.

  • DDoS Attacks Are On The Rise – And Fatal to Most Businesses

    Sponsored by: Arbor Networks

    This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.

  • Case Study: Technology Manufacturer Stops TeslaCrypt Attack

    Sponsored by: Carbon Black

    Download this case study to learn how to unravel, remediate, and moreover protect against all endpoint attacks (such as TeslaCrypt ransomware). Implement complete endpoint visibility with a proactive response platform that can reduce your number of breaches to zero.

  • Having Trouble Sharing Content Externally?

    Sponsored by: IntraLinks, Inc

    While most companies are fixing their security breaches and data leaks, they aren't addressing the security gaps that come from external content sharing. Access this blog to learn how to ensure secure collaboration between internal and external partners, and make sure that your security efforts don't go to waste.

  • IoT Security Testing: Cover All Your Bases

    Sponsored by: Synopsys

    Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.

  • Understanding & Mitigating DNS DDoS Attacks

    Sponsored by: Dyn

    DDoS attacks are easier than ever to execute, drain more resources and budget to mitigate, and place more revenue at risk than ever before. This quick guide is designed to help you understand and prevent DDoS attacks.

  • Best Practices for Secure and Efficient Onboarding and Off-boarding

    Sponsored by: RES Software

    Learn why provisioning identities and access in today's enterprise environment is inefficient, how to overcome the ingrained obstacles in its way, and how to leverage the benefits of a workforce that consistently has the digital resources it needs.

  • Your Roadmap to IoT and Cybersecurity Trends

    Sponsored by: Unisys

    See how security and privacy considerations of the internet of things can be addressed, how to form a strategy for public awareness of cybersecurity, and overall and formative cybersecurity trends. Learn the benefits and pitfalls of this ever changing landscape.

  • The Anatomy of Today's Top Cybersecurity Fields

    Sponsored by: Unisys

    Discover detailed breakdowns of top cybersecurity fields including research and development, federal information technology governance, as well as identity and access management. Learn how to address threats, recognize associated risks, and meet ongoing challenges in the vital threat landscape.

  • Ask The Analyst: Key Elements of an Effective Security Program

    Sponsored by: AlienVault

    In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.

  • Cloud App and Service Adoption: 11 Key Steps IT Should Take

    Sponsored by: Symantec + Blue Coat

    You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.

  • It's 2016, Do You Know Where Your Content Is?

    Sponsored by: IntraLinks, Inc

    Do you know where your content goes once it leaves the company? Who can access it? We have focused so much on accessing our content faster and from further away, but we might have lost track of security. Access this blog to learn how about data sovereignty and tracking your data no matter where it goes.

  • The Future State of Enhanced Cybersecurity in the Digital Economy

    Sponsored by: Unisys

    Discover security, privacy, and trust recommendations in the areas of critical Infrastructure, research and development, federal governance, IAM, and IoT in today's digital, interdependence-based economy.

  • The Anatomy of DDoS Attacks And Best Practices for Preventing Them

    Sponsored by: Arbor Networks

    This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.

  • Application Development Security Requires Forethought

    Sponsored by: Synopsys

    In this e-guide learn not only how to stay ahead of the competition with a quick development cycle, but also how to ensure the final product stays safe and sound.

  • How IAM Addresses Unstructured Content Security Risks

    Sponsored by: STEALTHbits

    Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.

  • Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics

    Sponsored by:

    This virtual event, produced jointly by ISACA,, and focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: Synopsys

    This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.

  • Extending Global Load Balancing to the Cloud With Secondary DNS

    Sponsored by: Dyn

    Discover how on premise global load balancing (GLB) can become part of your cloud deployment. With GLB enhancing your DNS networks, you can improve security and prevent DDoS attacks.

  • The Connection between IoT and DDoS Attacks

    Sponsored by: Arbor Networks

    In this e-guide learn of recent DDoS attacks on organizations, how botnets are getting bigger and stronger, and the true cost of being targeted by one of these attacks.

  • Authentication Best Practices: On and Off the Cloud

    Sponsored by: HID

    Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.