ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • The Anatomy of a Ransomware Attack

    Sponsored by: Exabeam

    Read this research report to understand the business models used by ransomware network operators and how you can detect and disrupt ransomware in your corporate environments.

  • How Strongarm's Malware Protection Solution Works

    Sponsored by: eTECH Channel

    You need an efficient way to stop malware from damaging your customers' businesses. Discover simple and automated malware protection that will help you protect customer networks while minimizing complexity.

  • Six Steps to a Better Security Strategy

    Sponsored by: Armor

    This Forrester report provides you six essential steps to create an effective security strategy linked with key business interests and success factors.

  • HIPAA Compliance & Risk Management

    Sponsored by: Armor

    Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.

  • Are You a Security-First Organization?

    Sponsored by: Armor

    Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.

  • Securing the Connected Car Ecosystem

    Sponsored by: Arxan

    Discover how this leading automaker was able to protect their Connected Car environment to mitigate never before seen security risks and stop hackers from injecting malicious code into customers' vehicles.

  • Endpoint threat detection gets more response

    Sponsored by: Hewlett Packard Enterprise

    Discover how security teams worldwide are attempting to stop cyberthreats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.

  • Assessing Cybersecurity Risk in a Breached World

    Sponsored by: Infocyte

    It's imperative you include regular compromise assessments as part of your information and IT risk management strategy. Enable your operations team to catch what prevention and monitoring technologies miss, and learn how to best mitigate the possible damage that can be caused from persistent compromises before hackers make their move.

  • A Business Case For Funding Your Insider Threat Program

    Sponsored by: Forcepoint

    Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.

  • Confidence in the Breach Age: Risks, Preparation, Response & Recovery

    Sponsored by: AllClear ID

    Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.

  • Three Critical Steps to Launch a Data Breach Response

    Sponsored by: AllClear ID

    This resource highlights three critical steps in launching an effective incident response plan. Learn how to assemble a team, build communication channels with that team, draft different plans around specific incidents types and offer helpful services like identity theft protection.

  • What I've Learned from 5,000 Data Breaches

    Sponsored by: AllClear ID

    As data breaches continue to increase, consumer expectations follow behind and expect well-orchestrated response time. Plan out how affected customers will be notified and supported throughout the entire data breach response process, from notification, to protection, to fraud resolution.

  • Illuminating the Real Cost of Incidents from an Insurer's Perspective

    Sponsored by: AllClear ID

    This study helps you understand the true impact of data insecurity and the real cost of incidents by consolidating claims data from multiple insurers.

  • SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring

    Sponsored by: Hewlett Packard Enterprise

    Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why.

  • The pitfalls of two-factor authentication

    Sponsored by: IBM

    Discover the shortcomings of two-factor authentication, including its inability to defend against theft and transaction signings. Learn how a better layered security approach can help identify the root cause of malware and help protect high-value transactions.

  • Comparison Guide Email Encryption

    Sponsored by: ZixCorp

    Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.

  • Top Five CEO Wire Fraud Attacks

    Sponsored by: Cloudmark

    As an attack, the CEO email wire fraud attack couldn't be simpler. There's no malware to write and no malicious code or links to implant. It's a text only email, plain and simple - but it's the social engineering that makes it work.

  • Transforming Enterprise Security with Advanced Analytics

    Sponsored by: MASERGY

    Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.

  • What CIOs Need to Know About IoT and Security Risks

    Sponsored by: MASERGY

    Businesses that already have IoT initiatives have seen increased revenue around 16% last year in the areas of business affected by the effort, according to a recent study. Still, as enticing as these prospects are the question that CIOs must ask are: How secure are IoT sensors and networks?

  • 3 Major Challenges to Securing Your Network

    Sponsored by: Juniper Networks, Inc.

    This report addresses the top 3 major security challenges as your organization moves into the cloud. Gain an overview of strategies for protecting your data and network.

  • The Executive's Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data & Cisco

    This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.

  • Protect your Organization Against Cybercrime in the Digital Era

    Sponsored by: Dimension Data & Cisco

    See stats about this past year's detected cyberattacks and learn how to protect your private data against in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.

  • IBM Security Guardium Vulnerability Assessment

    Sponsored by: IBM

    Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.

  • Oracle database licensing challenges

    Sponsored by: Matrix42

    This white paper shows you three examples businesses whose licensing agreements with Oracle fell short of expectations. Learn some of the shortcomings these businesses experienced to protect yourself from similar involvement.

  • Tips to Secure your Virtualized Data Center

    Sponsored by: TechData - Kaspersky

    This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.