Research Library

Powered by

Vulnerability Management Research

  • Trustwave Managed Security Testing - DON’T GUESS. TEST.

    Sponsored by: Trustwave

    Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.

  • Protecting the Enterprise from User Security Vulnerabilities

    Sponsored by: RES Software

    Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.

  • The Anatomy of Today's Top Cybersecurity Fields

    Sponsored by: Unisys

    Discover detailed breakdowns of top cybersecurity fields including research and development, federal information technology governance, as well as identity and access management. Learn how to address threats, recognize associated risks, and meet ongoing challenges in the vital threat landscape.

  • The Total Economic Impact of Software Testing Tools

    Sponsored by: Synopsys

    The purpose of this Forrester study is to provide readers with a framework to evaluate the potential financial impact of security tools on their organizations. Discover how you can catch and fix quality defects and security vulnerabilities om source code earlier in the software development cycle when they are cheaper and easier to address.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • How To Build An Enterprise Application Security Program

    Sponsored by: Blue Coat Systems

    Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.

  • The Rise of Cloud-based Application Security Vulnerabilities

    Sponsored by: Blue Coat Systems

    While it can be beneficial to store app data in the cloud, it's causing many security concerns because of the sensitive nature of the information. Explore this e-guide to learn common vulnerabilities in cloud-based apps and best practices for properly protecting app data.

  • An Enterprise Guide to Preventing Ransomware Attacks

    Sponsored by: Carbon Black

    This e-book answers questions like "What is ransomware?" and "How does it work?" to help you learn how to defend your business. Explore how new and advanced ransomware like Locky operate and review case studies from companies that have successfully stopped attacks so that you can start preparing your organization.

  • Unisys Managed Security Services Featuring LogRhythm

    Sponsored by: Unisys

    Many enterprises find the task of sifting through their vast stores of logs in order to identify critical security events a daunting task. Learn about a simplified way to not only monitor your network logs for malicious activity, but implement a fully-fledged security monitoring policy covering the entire holistic attack surface.

  • 5 Signs You Need A Mobile Security Game Plan

    Sponsored by: Appthority

    Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for handling ransomware attacks. You'll get expert advice on how to improve your network security strategy and defend against advanced malware threats.

  • Healthcare Security: The Simplest Way to Stay Ahead of Attacks

    Sponsored by: OpenDNS

    In healthcare, a ransomware outbreak can lead to a true life or death situation – and cybercriminals know that you'll pay up to decrypt patient data. Access this brief to find out how you can simplify PHI protection and close security gaps to significantly reduce malware from getting in and data from being exfiltrated.

  • Security Testing Practices and Priorities

    Sponsored by: Trustwave

    This report shows the survey results from Osterman Research about security testing within various organizations. Discover which security issues organizations had experienced most frequently within the past year and how vulnerable many of these organizations were.

  • The Security Survival Guide for Growing Businesses

    Sponsored by: Trustwave

    This guide will walk you step by step through the reasons why your security may be suffering and offer practical tips for addressing your pain points so you can take your data protection to the next level.

  • Insider Threat Spotlight Report

    Sponsored by: Dell Software

    The increase in insider data theft highlights the need for better security practices. In fact, 40% of organizations don't even have the ability to detect insider threats. Access this spotlight report on insider threats to uncover more key trends that demonstrate the magnitude of this risk, and what you can do to prevent it.

  • Assess Your Open File Shares to Combat Security, Compliance Risk

    Sponsored by: STEALTHbits

    Even the best security is powerless in the face of a file share that nearly everyone has access to, especially one that contains sensitive data you didn't even know was out there. Discover inappropriate access before it's too late. Get an open share assessment and make sure your data is safe.

  • Risk Assessment

    Sponsored by: STEALTHbits

    In as little as 5 hours, you'll learn your top 5 data security vulnerabilities and get insight on how to patch them up.

  • The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?

    Sponsored by: SecureWorks

    Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: Trustwave

    There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.

  • What's the Best Way to Handle External Security Auditors?

    Sponsored by: Dell Software

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

  • DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us

    Sponsored by: Neustar

    Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.

  • How are Banks Fighting the War on Fraud

    Sponsored by: Neustar

    Discover how banks are fighting fraud, the amount of import they put on fraud and what they deem are the biggest impacts of fraud on their organization. Learn what to look for in an anti-fraud solution to balance security and customer convenience perfectly.

  • Cyber Threats to Online Shopping Cheer

    Sponsored by: Neustar

    Learn how to protect your brand and stay online during high-volume occasions. See statistics on current online shopping trends and discover how to stop fraudulent actors before they can damage your organization.

  • Case Study: Reclaiming Website Security and Control

    Sponsored by: Neustar

    Cochrane needed faster, more secure service from their DNS to ensure domain queries are routed correctly and to keep their audience happy. Discover how Cochrane was able to slash response times and ensure maximum server uptime, all while bolstering security.

  • 2016 Neustar DDoS Attacks & Protection Report

    Sponsored by: Neustar

    This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.