ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • If A Hacker Wants Your Data, Make Sure They Really Work For It

    Sponsored by: Carbon Black

    This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.

  • Cb Defense

    Sponsored by: Carbon Black

    Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.

  • Ponemon Institute Application Security Risk Management Study

    Sponsored by: IBM

    This report shows you the results of the recent Ponemon Institute study entitled "How to Make Application Security a Strategically Managed Discipline". Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.

  • Cb Endpoint Security Platform

    Sponsored by: Carbon Black

    Discover how to stop more attacks, see more threats, and close every vulnerability your endpoints currently have. Utilize both machine learning and behavioral analytics to analyze all available endpoint data. The end result: zero-gap protection for all your endpoints.

  • Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

    Sponsored by: AlienVault

    Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

  • Ransomware Response Guide

    Sponsored by: IBM

    The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.

  • The Anatomy of a Ransomware Attack

    Sponsored by: Exabeam

    Read this research report to understand the business models used by ransomware network operators and how you can detect and disrupt ransomware in your corporate environments.

  • How Strongarm's Malware Protection Solution Works

    Sponsored by: eTECH Channel

    You need an efficient way to stop malware from damaging your customers' businesses. Discover simple and automated malware protection that will help you protect customer networks while minimizing complexity.

  • Six Steps to a Better Security Strategy

    Sponsored by: Armor

    This Forrester report provides you six essential steps to create an effective security strategy linked with key business interests and success factors.

  • HIPAA Compliance & Risk Management

    Sponsored by: Armor

    Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.

  • Are You a Security-First Organization?

    Sponsored by: Armor

    Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.

  • Securing the Connected Car Ecosystem

    Sponsored by: Arxan

    Discover how this leading automaker was able to protect their Connected Car environment to mitigate never before seen security risks and stop hackers from injecting malicious code into customers' vehicles.

  • Endpoint threat detection gets more response

    Sponsored by: Hewlett Packard Enterprise

    Discover how security teams worldwide are attempting to stop cyberthreats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.

  • Assessing Cybersecurity Risk in a Breached World

    Sponsored by: Infocyte

    It's imperative you include regular compromise assessments as part of your information and IT risk management strategy. Enable your operations team to catch what prevention and monitoring technologies miss, and learn how to best mitigate the possible damage that can be caused from persistent compromises before hackers make their move.

  • A Business Case For Funding Your Insider Threat Program

    Sponsored by: Forcepoint

    Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.

  • Confidence in the Breach Age: Risks, Preparation, Response & Recovery

    Sponsored by: AllClear ID

    Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.

  • Three Critical Steps to Launch a Data Breach Response

    Sponsored by: AllClear ID

    This resource highlights three critical steps in launching an effective incident response plan. Learn how to assemble a team, build communication channels with that team, draft different plans around specific incidents types and offer helpful services like identity theft protection.

  • What I've Learned from 5,000 Data Breaches

    Sponsored by: AllClear ID

    As data breaches continue to increase, consumer expectations follow behind and expect well-orchestrated response time. Plan out how affected customers will be notified and supported throughout the entire data breach response process, from notification, to protection, to fraud resolution.

  • Illuminating the Real Cost of Incidents from an Insurer's Perspective

    Sponsored by: AllClear ID

    This study helps you understand the true impact of data insecurity and the real cost of incidents by consolidating claims data from multiple insurers.

  • Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces

    Sponsored by: Dell, Inc.

    Explore some of today's challenges in endpoint security and how desktop virtualization strategies can significantly reduce risks and improve protection at endpoints. You'll also examine real-world examples of organizations using desktop virtualization architectures with thin clients to enhance security.

  • Wireless Security Survey 2016

    Sponsored by: Fortinet, Inc.

    79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.

  • Behind the Mask: The Changing Face of Hacking

    Sponsored by: Hewlett Packard Enterprise

    This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.

  • SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring

    Sponsored by: Hewlett Packard Enterprise

    Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why.

  • The pitfalls of two-factor authentication

    Sponsored by: IBM

    Discover the shortcomings of two-factor authentication, including its inability to defend against theft and transaction signings. Learn how a better layered security approach can help identify the root cause of malware and help protect high-value transactions.

  • Removing Malware and Undetectable Windows AppLocker

    Sponsored by: Check Point Software Technologies Ltd.

    A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.