ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • Innovation Insight for Security Orchestration, Automation and Response

    Sponsored by: ServiceNow

    This Gartner report analyzes security orchestration, automation, and response (SOAR) tools and explores how they can help you improve security operations efficiency, quality and efficacy for your organization.

  • Financial Institution Security

    Sponsored by: enSilo

    Reviewing and selecting endpoint products to protect a financial institution's servers and ATM's is an extensive process.This resource offers strategies for improving security and downtime within financial institutions.

  • Potential ROI and Benefits of ServiceNow Security Operations

    Sponsored by: ServiceNow

    This report provides a framework for evaluating the potential financial impact of investing in ServiceNow Security Operations to improve security incident and vulnerability response processes.

  • Two-Factor Authentication Evaluation Guide

    Sponsored by: Duo Security

    This e-book details a comprehensive set of criteria to customize your evaluation to your organization's security needs and how to determine your ROI when deploying your two-factor authentication tools.

  • Contingent Workers

    Sponsored by: Identity Automation

    By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.

  • The Art of Application Security: Getting Started with DevSecOps

    Sponsored by: Whitehat Securities

    According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.

  • The ROI of AppSec: Getting your Money's Worth from your AppSec Program

    Sponsored by: Veracode, Inc.

    Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.

  • 2017 Application Security Statistics Report

    Sponsored by: Whitehat Securities

    According to the Verizon 2017 DBIR, 30% of total breaches reported involved attacks on web applications. This 60-page application security statistics report provides perspective on the present application security posture of hundreds of organizations, so that enterprises like yours can understand and improve their own security.

  • Vulnerable By Design: Why Destructive Exploits Keep On Coming

    Sponsored by: enSilo

    Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition uncover the differences between design and security vulnerabilities.

  • PCI DSS Endpoint Security

    Sponsored by: enSilo

    Take a look at this white paper to learn more about the PCI DSS compliance regulation and how to secure your endpoints to comply with the policy.

  • The Theory Behind Google's Beyond Corp Security Model

    Sponsored by: Duo Security

    Google's BeyondCorp security model states no traffic within an enterprise's network is any more trustworthy by default than traffic coming in from the outside. This resource offers insight into advancing enterprise security based on Google's BeyondCorp model.

  • Insider's Guide to Incident Response

    Sponsored by: AlienVault

    68% of respondents to a recent SAN survey cited a skills shortage as being an impediment to effective incident response.This 48-page e-book provides insight into effective incident response strategies, why they are necessary, and step-by-step improvements you can take to advance your posture.

  • The State of Security for In-Production Web Applications

    Sponsored by: tCell

    In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.

  • Threat Landscape Report

    Sponsored by: Fortinet, Inc.

    According to the Fortinet Threat Landscape Report, in Q3 of 2017 alone, there were 14,904 unique variants of malware. Explore this 28-page Threat Landscape Report to uncover staggering statistics regarding exploits, malware, and botnets and how you can use the current trends to improve your threat management security posture.

  • Executing a Lockdown on Cybersecurity Threats

    Sponsored by: Navex Global

    Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.

  • 2018 Top 10 Business Intelligence Trends

    Sponsored by: Tableau Software

    Business intelligence platforms are constantly evolving, so whether you're rockstar or an IT hero, you need to know these top 10 business intelligence trends for 2018.

  • Staying Secure is All About Keeping One Step Ahead

    Sponsored by: BT

    With the dramatic explosion of cyberattacks, it is necessary to constantly monitor for threats rather than reacting to them after the fact. This brief webcast offers strategies of staying one step ahead of the next security threat, in order to give your enterprise the security it needs.

  • Securing the Digital Enterprise

    Sponsored by: BT

    Cybersecurity dominates the media and the chances of a business or an individual becoming a victim have never been greater. This white paper provides a practical guide to organizations on their journey to using security as a business enabler as well as offering useful checklists for those who are already on their journey to protection.

  • 7 Key Security Controls for Compliant Cloud Workloads

    Sponsored by: CloudPassage

    According to the Cloud Security 2017 Spotlight Report, organizations are increasing cloud spending 20% year over year, and more than 3/4s of firms are piloting, implementing or already operating in the cloud today. Take a look at this article to uncover 7 key security controls for compliant workloads in order to advance your cloud security.

  • Achieve Security and Compliance in the Cloud Without Breaking the Bank

    Sponsored by: Alert Logic

    Take a closer look at this infographic to uncover how IT professionals from 4 large sized companies implemented a security-as-a-service approach without breaking the bank.

  • FBI Cyber Squad Guest Speaking on Emerging Cyber Threats

    Sponsored by: Digital Shadows

    Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.

  • Top Cyber Threats to the Technology Sector

    Sponsored by: Digital Shadows

    Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.

  • The Pressing Need for Digital Risk Management

    Sponsored by: Digital Shadows

    According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.

  • Top Cyber Threats to the Legal Sector

    Sponsored by: Digital Shadows

    Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.

  • Security Automation and Orchestration Best Practices

    Sponsored by: ServiceNow

    According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.