ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • 2017 Study on Mobile and IoT App Security

    Sponsored by: IBM

    According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.

  • Leverage On-Demand Testing with Vulnerability Analytics

    Sponsored by: IBM

    Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.

  • The Benefits of Bug Bounty Programs and Security Code Testing

    Sponsored by: Veracode, Inc.

    In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.

  • Trustwave Global Security Report

    Sponsored by: SingTel

    Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.

  • Exploit Kits: Getting In by Any Means Necessary

    Sponsored by: Palo Alto Networks

    This white paper explores the concept of exploit kits and how to defend against them. Uncover tips for reducing your attack surface, blocking known malware and exploits, identifying new threats, and more.

  • The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

    Sponsored by: Absolute

    Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.

  • The Phishing Breakthrough Point

    Sponsored by: KnowBe4

    Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.

  • Demo: Next-Gen Antivirus in Action

    Sponsored by: Carbon Black

    Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Symantec & Blue Coat Systems

    This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Symantec & Blue Coat Systems

    In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Top 10 Data Security Tips to Safeguard Your Business

    Sponsored by: Absolute

    New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.

  • At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

    Sponsored by: Absolute

    Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.

  • Defend Your Apps and Websites From Multi-Vector DDoS Attacks

    Sponsored by: A10 Networks

    Discover an alternative to current, ineffective DDoS protection solutions in this short video. Learn about multi-vector protection and always-on application availability that is also scalable, efficient, and affordable.

  • DDoS: A Clear and Present Danger

    Sponsored by: A10 Networks

    Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.

  • Ultimate Guide to Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    Learn everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of a strong multi-vector DDoS attack protection solution.

  • Don't Guess. Test. Uncover Your Security Vulnerabilities

    Sponsored by: Trustwave

    Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.

  • Protecting the Enterprise from User Security Vulnerabilities

    Sponsored by: RES Software

    Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.

  • 5 Signs You Need A Mobile Security Game Plan

    Sponsored by: Appthority

    Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.

  • Healthcare security - The simplest way to stay ahead of attacks

    Sponsored by: Cisco

    Access this brief to discover how you can simplify PHI protection and close security gaps by using DNS. Learn how OpenDNS can help healthcare organizations significantly reduce malware from getting in and data from being exfiltrated.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Four Top Cybercrime Trends

    Sponsored by: IBM

    Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.

  • QRAT Malware-As-A-Service

    Sponsored by: Booz Allen Hamilton

    QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • What's the Best Way to Handle External Security Auditors?

    Sponsored by: Dell Software

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.