ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • Tolly Test Report: Evaluating a Web Protection Vendor

    Sponsored by: IBM

    In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.

  • Ransomware Multi-layered Approach

    Sponsored by: TrendMicro

    Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.

  • How Trend Micro Stacks Up among Endpoint Protection Vendors

    Sponsored by: TrendMicro

    This Gartner Magic Quadrant report offers cyber security executives invaluable information you can use to choose your next endpoint protection vendor.

  • The Executive’s Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read 3 additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.

  • 5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks

    Sponsored by: IBM

    A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent 5 harmful occurrences.

  • The 411 on Mobile Application Security Testing and Runtime Protection for iOS Applications

    Sponsored by: IBM

    This webcast provides best practices for mobile application testing for security vulnerabilities and protecting them at runtime, with a special emphasis on iOS applications. You'll learn how to protect your ever-expanding portfolio of mobile apps, to stay one step ahead of the rush-to-release phenomenon.

  • Uncovering the Risk of SAP Cyber Breaches

    Sponsored by: Onapsis

    The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • Benchmark Your Threat Detection Effectiveness

    Sponsored by: RSA

    This white paper describes the results of a global survey of 160 respondents across 22 different industry sectors in the Americas, EMEA and APJ from December 2015 through February 2016 to understand how effective organizations are at detecting and investigating cyber threats.

  • A Proven Security Intelligence Model for Combating Cyber Threats: A Reference Model for IT Security Practitioners

    Sponsored by: LogRhythm, Inc.

    No matter the size of your organization, discover how to fully realize your Security Intelligence objectives through this white paper. You'll learn how to keep your security architecture flexible to adopt and mature capabilities over time and significantly reduce your risk of experiencing costly cyber incidents moving forward.

  • Total Economic Impact (TEI) Study

    Sponsored by: IBM

    This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • Cybersecurity Poverty Index

    Sponsored by: RSA Softcat

    Uncover the findings of The Cybersecurity Poverty Index, completed by 878 respondents across 81 countries. It provides a measure of the risk management and information security capabilities of the global population.

  • DHS US-CERT Alert on SAP Cybersecurity

    Sponsored by: Onapsis

    This U.S. government alert addresses recent vulnerabilities issues caused by SAP applications. Learn the cause and extent of these vulnerabilities, as well as solutions for mitigating them.

  • Insider’s Guide To Minimizing The Impact of Ransomware

    Sponsored by: Druva Software

    This white paper provides 6 steps you can take to reduce the impact of ransomware and other malware attacks. Learn how you can restore data quickly from time-indexed copies in order to reduce vulnerability and its costs.

  • DDoS Attack Stats & Trends

    Sponsored by: Akamai

    This infographic shows you crucial DDoS findings for Q1 of 2016. Learn how drastically DDoS attacks have increased, which industries they've affected the most and what you can do to protect your network.

  • Why DDoS Prevention Appliances are So Important Today

    Sponsored by: Arbor Networks

    Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..

  • A SECURITY MANAGER'€™S GUIDE TO VENDOR RISK MANAGEMENT

    Sponsored by: BitSight

    Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.

  • How to Secure Your IAM System

    Sponsored by: Radiant Logic, Inc.

    Discover how to strengthen the security of your IAM system by encrypting data at rest, adding multi-factor authentication, and protecting key accounts.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • Securosis: Securing Hadoop: Security Recommendations for Hadoop Environments

    Sponsored by: Vormetric

    This research paper lays out a series of recommended security controls for Hadoop, along with the rationale for each. The analysis is based upon conversations with dozens of data scientists, developers, IT staff, project managers, and security folks from companies of all sizes; as well as decades of security experience the Securosis team brings.

  • Ponemon Institute Application Security Risk Management Study

    Sponsored by: IBM

    This report shows you the results of the recent Ponemon Institute study entitled "How to Make Application Security a Strategically Managed Discipline". Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.

  • If A Hacker Wants Your Data, Make Sure They Really Work For It

    Sponsored by: Carbon Black

    This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.

  • Cb Defense

    Sponsored by: Carbon Black

    Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.

  • Close Security Gaps for Every Endpoint

    Sponsored by: Carbon Black

    Learn how you can utilize both machine learning and behavioral analytics to analyze all available endpoint data, helping you stop more attacks, see more threats, and close every vulnerability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.