ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • The Executive’s Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read on to read three additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.

  • The 411 on Mobile Application Security Testing and Runtime Protection for iOS Applications

    Sponsored by: IBM

    This webcast provides best practices for mobile application testing for security vulnerabilities and protecting them at runtime, with a special emphasis on iOS applications. You'll learn how to protect your ever-expanding portfolio of mobile apps, to stay one step ahead of the rush-to-release phenomenon.

  • Uncovering the Risk of SAP Cyber Breaches

    Sponsored by: Onapsis

    The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • A Proven Security Intelligence Model for Combating Cyber Threats: A Reference Model for IT Security Practitioners

    Sponsored by: LogRhythm, Inc.

    No matter the size of your organization, discover how to fully realize your Security Intelligence objectives through this white paper. You'll learn how to keep your security architecture flexible to adopt and mature capabilities over time and significantly reduce your risk of experiencing costly cyber incidents moving forward.

  • Total Economic Impact (TEI) Study

    Sponsored by: IBM

    This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • Cybersecurity Poverty Index

    Sponsored by: RSA Softcat

    Uncover the findings of The Cybersecurity Poverty Index, completed by 878 respondents across 81 countries. It provides a measure of the risk management and information security capabilities of the global population.

  • DHS US-CERT Alert on SAP Cybersecurity

    Sponsored by: Onapsis

    This U.S. government alert addresses recent vulnerabilities issues caused by SAP applications. Learn the cause and extent of these vulnerabilities, as well as solutions for mitigating them.

  • Is Your MFT Ready for Digital?

    Sponsored by: Axway

    The data universe is expanding and cyberattacks are increasing. As more businesses go increasingly digital, file sharing grows in importance. Explore what it means to securely go digital and prepare your managed file transfer platform to do the same.

  • Insider’s Guide To Minimizing The Impact of Ransomware

    Sponsored by: Druva Software

    This white paper provides 6 steps you can take to reduce the impact of ransomware and other malware attacks. Learn how you can restore data quickly from time-indexed copies in order to reduce vulnerability and its costs.

  • DDoS Attack Stats & Trends

    Sponsored by: Akamai

    This infographic shows you crucial DDoS findings for Q1 of 2016. Learn how drastically DDoS attacks have increased, which industries they've affected the most and what you can do to protect your network.

  • Why DDoS Prevention Appliances are So Important Today

    Sponsored by: Arbor Networks

    Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..

  • A SECURITY MANAGER'€™S GUIDE TO VENDOR RISK MANAGEMENT

    Sponsored by: BitSight

    Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • Securosis: Securing Hadoop: Security Recommendations for Hadoop Environments

    Sponsored by: Vormetric

    This research paper lays out a series of recommended security controls for Hadoop, along with the rationale for each. The analysis is based upon conversations with dozens of data scientists, developers, IT staff, project managers, and security folks from companies of all sizes; as well as decades of security experience the Securosis team brings.

  • Ponemon Institute Application Security Risk Management Study

    Sponsored by: IBM

    This report shows you the results of the recent Ponemon Institute study entitled "How to Make Application Security a Strategically Managed Discipline". Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.

  • Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

    Sponsored by: AlienVault

    Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

  • Ransomware Response Guide

    Sponsored by: IBM

    The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.

  • The Anatomy of a Ransomware Attack

    Sponsored by: Exabeam

    Read this research report to understand the business models used by ransomware network operators and how you can detect and disrupt ransomware in your corporate environments.

  • Six Steps to a Better Security Strategy

    Sponsored by: Armor

    This Forrester report provides you six essential steps to create an effective security strategy linked with key business interests and success factors.

  • HIPAA Compliance & Risk Management

    Sponsored by: Armor

    Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.

  • 5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks

    Sponsored by: IBM

    A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent 5 harmful occurrences.

  • If A Hacker Wants Your Data, Make Sure They Really Work For It

    Sponsored by: Carbon Black

    This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.

  • Cb Defense

    Sponsored by: Carbon Black

    Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.

  • Close Security Gaps for Every Endpoint

    Sponsored by: Carbon Black

    Learn how you can utilize both machine learning and behavioral analytics to analyze all available endpoint data, helping you stop more attacks, see more threats, and close every vulnerability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.