ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

    Sponsored by: Rapid7

    In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.

  • Building a More Effective Vulnerability Scanning Program

    Sponsored by: Rapid7

    This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior.

  • Building a World-Class Web Application Security Program

    Sponsored by: Rapid7

    Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system.

  • IT/Security Alignment Paves the Way for Effective Risk Management at University of Salzburg

    Sponsored by: Rapid7

    Find out how the University of Salzburg's small IT team was able to gain simple reporting that helped them prioritize and remediate issues based off the needs of the organization in this case study.

  • Gain Deeper Insights into Your System with this Vulnerability Management System

    Sponsored by: Rapid7

    In this white paper, learn about a new vulnerability management system which can provide you with constant intelligence to discover, pinpoint, and prioritize threats to your business.

  • Vulnerability Management Buyer's Guide

    Sponsored by: Rapid7

    In this buyer's guide learn the 4 essential components in an effective vulnerability management (VM) program, as well as other considerations to take into account like the price, and ROI to take into account when shopping for your VM system.

  • Top 10 Business Logic Attack Vectors Attacking and Exploiting Business Application Assets and Flaws – Vulnerability Detection to Fix

    Sponsored by: Rapid7

    In this white paper, gain an overview of the top 10 business logic flaw attacks, as well as some tips on how you can test and eliminate these kinds of vulnerabilities.

  • When Software Goes Rogue

    Sponsored by: BDNA

    How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • The Benefits of Bug Bounty Programs and Security Code Testing

    Sponsored by: Veracode, Inc.

    In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.

  • Exploit Kits: Getting In by Any Means Necessary

    Sponsored by: Palo Alto Networks

    This white paper explores the concept of exploit kits and how to defend against them. Uncover tips for reducing your attack surface, blocking known malware and exploits, identifying new threats, and more.

  • The Phishing Breakthrough Point

    Sponsored by: KnowBe4

    Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: McAfee, Inc.

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Ultimate Guide to Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    Learn everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of a strong multi-vector DDoS attack protection solution.

  • Healthcare security - The simplest way to stay ahead of attacks

    Sponsored by: Cisco Umbrella

    Access this brief to discover how you can simplify PHI protection and close security gaps by using DNS. Learn how OpenDNS can help healthcare organizations significantly reduce malware from getting in and data from being exfiltrated.

  • Demo: Next-Gen Antivirus in Action

    Sponsored by: Carbon Black

    Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.

  • Four Top Cybercrime Trends

    Sponsored by: IBM

    Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.

  • QRAT Malware-As-A-Service

    Sponsored by: Booz Allen Hamilton

    QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.

  • Protecting the Enterprise from User Security Vulnerabilities

    Sponsored by: RES Software

    Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • What's the Best Way to Handle External Security Auditors?

    Sponsored by: Dell Software

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

  • DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us

    Sponsored by: Neustar

    Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.

  • How are Banks Fighting the War on Fraud

    Sponsored by: Neustar

    Discover how banks are fighting fraud, the amount of import they put on fraud and what they deem are the biggest impacts of fraud on their organization. Learn what to look for in an anti-fraud solution to balance security and customer convenience perfectly.

  • Cyber Threats to Online Shopping Cheer

    Sponsored by: Neustar

    Learn how to protect your brand and stay online during high-volume occasions. See statistics on current online shopping trends and discover how to stop fraudulent actors before they can damage your organization.

  • Case Study: Reclaiming Website Security and Control

    Sponsored by: Neustar

    Cochrane needed faster, more secure service from their DNS to ensure domain queries are routed correctly and to keep their audience happy. Discover how Cochrane was able to slash response times and ensure maximum server uptime, all while bolstering security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.