ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • Harnessing the Power of Metadata for Security

    Sponsored by: Gigamon

    Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation. Learn how to enable more in-depth security analysis of traffic that is focused on the areas of concern, ultimately resulting in faster time to detection, response, and mitigation.

  • The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?

    Sponsored by: SecureWorks

    Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: Trustwave

    There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.

  • Addressing the Full Attack Continuum (BDA WP)

    Sponsored by: Cisco Systems, Inc.

    It's time for a new threat-centric security model that delivers the visibility and control your organization needs. Discover how to reduce the complexity of threat management while gaining continuous control and advanced threat protection across the entire attack continuum. Act smarter and quicker before, during and after an attack.

  • Open Access

    Sponsored by: STEALTHbits

    Discover how to discern who has access to your unstructured data and see all open shares on your network. Protect against malicious access, reduce security risk, fulfill compliance requirements and decrease operations expense by first accessing this valuable resource.

  • Securing Connected Cars Through Comprehensive Software Testing

    Sponsored by: Synopsys

    There is a need for greater software testing and assurance in the automotive industry today. Dig deeper into the vulnerabilities associated with automotive software and learn how to test it before your vehicle roles into the dealership.

  • Buying Criteria for Next-Generation Network Security

    Sponsored by: Cisco Systems, Inc.

    Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.

  • Operationalize Security to Patch Vulnerabilities

    Sponsored by: BMC

    This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.

  • Here's What Your Personal Data is Going for on the Dark Web

    Sponsored by: BMC

    How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.

  • Enabling The Industrial Internet Through Software Assurance

    Sponsored by: Synopsys

    Access this white paper to better understand the far reaching effects vulnerable industrial technologies could have on the world. Learn from organizations who have dealt with crippling cyber attacks and discover how to instill confidence in your devices' security moving forward.

  • QuadRooter: New Vulnerabilities Affecting Over 900 Million Android Devices

    Sponsored by: Check Point Software Technologies Ltd.

    This report details 4 newly-discovered vulnerabilities affecting over 900 million smartphones. If these exploits are leveraged, attackers can gain total access to the devices, including any sensitive personal and corporate data they carry.

  • Cyberattacks that Transcend the Digital World

    Sponsored by: OpenDNS

    This informative podcast takes a look at the vast, interconnected systems supporting our daily life. How at risk are the industrial systems behind the light switch on your wall, the water out of your tap? Find out now.

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • Tolly Test Report: Evaluating a Web Protection Vendor

    Sponsored by: IBM

    In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.

  • Ransomware Multi-layered Approach

    Sponsored by: TrendMicro

    Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.

  • How Trend Micro Stacks Up among Endpoint Protection Vendors

    Sponsored by: TrendMicro

    This Gartner Magic Quadrant report offers cyber security executives invaluable information you can use to choose your next endpoint protection vendor.

  • 5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks

    Sponsored by: IBM

    A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent the 5 most harmful occurrences.

  • Uncovering the Risk of SAP Cyber Breaches

    Sponsored by: Onapsis

    The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • Benchmark Your Threat Detection Effectiveness

    Sponsored by: RSA

    This white paper describes the results of a global survey of 160 respondents across 22 different industry sectors in the Americas, EMEA and APJ from December 2015 through February 2016 to understand how effective organizations are at detecting and investigating cyber threats.

  • Explore a Security Intelligence Model for Combating Cyber Threats

    Sponsored by: LogRhythm, Inc.

    Discover how to fully realize your security intelligence objectives. You'll learn how to keep your security architecture flexible to adopt and mature security intelligence capabilities over time and significantly reduce your risk of experiencing costly cyber incidents moving forward.

  • Total Economic Impact (TEI) Study

    Sponsored by: IBM

    This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • Cybersecurity Poverty Index

    Sponsored by: RSA Softcat

    Uncover the findings of The Cybersecurity Poverty Index, completed by 878 respondents across 81 countries. It provides a measure of the risk management and information security capabilities of the global population.

  • DHS US-CERT Alert on SAP Cybersecurity

    Sponsored by: Onapsis

    This U.S. government alert addresses recent vulnerabilities issues caused by SAP applications. Learn the cause and extent of these vulnerabilities, as well as solutions for mitigating them.

  • Is Your MFT Ready for Digital?

    Sponsored by: Axway

    The data universe is expanding and cyberattacks are increasing. As more businesses go increasingly digital, file sharing grows in importance. Explore what it means to securely go digital and prepare your managed file transfer platform to do the same.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.