ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • Reduce Open Source Security Risk: Strategies, Tactics and Tools

    Sponsored by: Rogue Wave Software

    Discover the tools and services you need to create an open source software (OSS) management strategy for your organization. Implementing an OSS strategy may take time, but when you consider the risks involved with unprotected OSS, it's easy to see the value it brings.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Blue Coat Systems

    This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Blue Coat Systems

    In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.

  • Threats and Mitigations: A Guide to Multi-Layered Web Security

    Sponsored by: Akamai

    Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.

  • Threat Summary: Top 2016 Cyber Risks

    Sponsored by: Proofpoint, Inc.

    Discover more about the top cyber risks we faced in 2016. Uncover threats, trends and transformations we saw in the security marketplace and receive future recommendations based on actionable intelligence.

  • Why Cybersecurity's Visibility Gap Matters and How Organizations Can Solve It

    Sponsored by: Proofpoint, Inc.

    Discover the origins of the cybersecurity visibility gap, its consequences and how to expand your field of view. Learn how to protect your people, data and brand more effectively by bringing your security tools beyond your network perimeter.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Mitigating Security Risk from Partners, Affiliates and Suppliers

    Sponsored by: Dell SecureWorks

    Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.

  • Infographic: Mitigating the Impact of Critical IT Events

    Sponsored by: Splunk Services UK Ltd

    Discover facts and figures regarding critical IT events (CIE) in this infographic. You'll learn the economic impact of CIE's, how they're negatively effecting organizations and learn mitigation techniques to reduce the damage caused by CIE's.

  • 3 Steps to Get Started with Web Application Security

    Sponsored by: Veracode, Inc.

    Learn how to make application security (AppSec) manageable. Discover three easy steps to help you get started on your new AppSec strategy.

  • Cracking the Code on Application Security Success

    Sponsored by: Veracode, Inc.

    Discover how to develop your own application security (AppSec) programs to reduce cyber risk and enable business to run as smoothly as possible. Learn key answers to your most pressing AppSec questions and get practical advice for working across teams to ensure the success of your new AppSec program.

  • Top 10 Data Security Tips to Safeguard Your Business

    Sponsored by: Absolute

    New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.

  • At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

    Sponsored by: Absolute

    Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.

  • Application Security Assessment

    Sponsored by: Kaspersky Lab

    Access this overview of an app security assessment that uncovers and mitigates vulnerabilities throughout the app lifecycle. Discover how to detect security flaws for cloud, ERP, web, and mobile apps so that you can radically improve your ability to protect critical data and systems.

  • Defend Your Apps and Websites From Multi-Vector DDoS Attacks

    Sponsored by: A10 Networks

    Discover an alternative to current, ineffective DDoS protection solutions in this short video. Learn about multi-vector protection and always-on application availability that is also scalable, efficient, and affordable.

  • DDoS: A Clear and Present Danger

    Sponsored by: A10 Networks

    Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.

  • Ultimate Guide to Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    Learn everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of a strong multi-vector DDoS attack protection solution.

  • Don't Guess. Test. Uncover Your Security Vulnerabilities

    Sponsored by: Trustwave

    Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.

  • Protecting the Enterprise from User Security Vulnerabilities

    Sponsored by: RES Software

    Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.

  • The Total Economic Impact of Software Testing Tools

    Sponsored by: Synopsys

    The purpose of this Forrester study is to provide readers with a framework to evaluate the potential financial impact of security tools on their organizations. Discover how you can catch and fix quality defects and security vulnerabilities om source code earlier in the software development cycle when they are cheaper and easier to address.

  • 5 Signs You Need A Mobile Security Game Plan

    Sponsored by: Appthority

    Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.

  • Four Top Cybercrime Trends

    Sponsored by: IBM

    Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • What's the Best Way to Handle External Security Auditors?

    Sponsored by: Dell Software

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.