ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • What I've Learned from 5,000 Data Breaches

    Sponsored by: AllClear ID

    Learn how to clearly communicate with customers after a data breach to ensure trust remains intact. Minimize confusion and anger by proactively preparing before a major breach occurs. Plan out how affected customers will be notified and supported throughout the entire response process, from notification, to protection, to fraud resolution.

  • Net Diligence Cyber Claims Study 2014

    Sponsored by: AllClear ID

    This study helps you risk understand the true impact of data insecurity by consolidating claims data from multiple insurers. The combined pool of claims is sizable enough that it allows us to ascertain real costs and project future trends.

  • Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces

    Sponsored by: Dell, Inc.

    Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.

  • Wireless Security Survey 2016

    Sponsored by: Fortinet, Inc.

    79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.

  • Removing Malware and Undetectable Windows AppLocker

    Sponsored by: Check Point Software Technologies Ltd.

    A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.

  • Healthcare CIOs Share Cybersecurity Best Practices

    Sponsored by: Symantec Corporation

    Cybersecurity is on everyone's mind in health IT. At HIMSS 2016, we spoke with 4 CIOs who provided advice on best practices and technologies you can (and should) implement to protect your organization from healthcare cybersecurity vulnerabilities.

  • Behind the Mask: The Changing Face of Hacking

    Sponsored by: Hewlett Packard Enterprise

    This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.

  • SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring

    Sponsored by: Hewlett Packard Enterprise

    Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why.

  • The pitfalls of two-factor authentication

    Sponsored by: IBM

    Discover the shortcomings of two-factor authentication, including its inability to defend against theft and transaction signings. Learn how a better layered security approach can help identify the root cause of malware and help protect high-value transactions.

  • Wireless Security Survey 2016

    Sponsored by: Fortinet, Inc.

    79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.

  • Take It to the Board

    Sponsored by: Kaspersky Lab

    Research shows that when executives get involved and truly understand the risks to their organizations, security budgets increase. Kaspersky Lab's ebook, Take It to the Board, pulls together the statistics and research you need to support your case.

  • Why Threat Intelligence is Critical for Next Generation Firewalls

    Sponsored by: Dell Software

    Read this paper and discover how a top-tier threat intelligence network makes the difference between an effective next-generation firewall and a mediocre one when it comes to defeating zero-day attacks and other advanced threats.

  • Comparison Guide Email Encryption

    Sponsored by: ZixCorp

    Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.

  • Top Five CEO Wire Fraud Attacks

    Sponsored by: Cloudmark

    As an attack, the CEO email wire fraud attack couldn't be simpler. There's no malware to write and no malicious code or links to implant. It's a text only email, plain and simple - but it's the social engineering that makes it work.

  • Transforming Enterprise Security with Advanced Analytics

    Sponsored by: MASERGY

    Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.

  • What CIOs Need to Know About IoT and Security Risks

    Sponsored by: MASERGY

    Perimeters have vanished. Organizations need to move past traditional security approaches and move to technologies like software-defined networking (SDN), which brings performance and efficiency advantages as well as security improvements. With so much to gain from the IoT, don't be scared away by fixable risks.

  • Tackling Workplace Mobility

    Sponsored by: VMware

    84% of employees use a mobile device during their work day and as mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.

  • Keep Your Data Safe for Office 365

    Sponsored by: Intel Security

    Built in DLP capabilities aren't robust enough to stop advanced persistent threats. Access now to learn how you can enhance your cloud data protection and gain expansive, yet flexible policies that will help address threats to your data and risky employee behavior.

  • Protecting Threats in a Small Business Environment

    Sponsored by: CDW

    Access this white paper for insights on how small businesses can more efficiently handle their security infrastructure. Even without an extensive IT staff, small businesses can deploy a robust, easy-to-manage security platform protecting your data and your reputation.

  • Small Business IT Security: Save Money, Save Face

    Sponsored by: CDW

    This article from security expert Mark Lachniet shows you strategic steps your SMB can take to ensure your limited IT budget doesn't mean increased cybersecurity risks. You'll learn four specific guidelines to help you understand your greatest vulnerabilities lie and how to cost effectively mitigate them.

  • 3 Major Challenges to Securing Your Network

    Sponsored by: Juniper Networks, Inc.

    This report addresses the top 3 major security challenges as your organization moves into the cloud. Gain an overview of strategies for protecting your data and network.

  • Data loss prevention and enterprise file sync and sharing: is your data safe?

    Sponsored by: Citrix

    Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.

  • Threat Defenses, Security Projects, and Cloud Security

    Sponsored by: TrendMicro

    As 2016 gets underway, many security professionals will have the opportunity to look at advanced threats and indicators of compromise through a different lens. This exclusive e-guide takes a look at today's threat landscape and what organizations are doing to ensure data is protected.

  • Network Testing Types to Ensure Top Performance, ROI and Security

    Sponsored by: Ixia

    Testing is a crucial part of the lifecycle of networks, products, and services across technology as change becomes more rapid and complexity increases. Testing not only helps project meet or exceed expectations, but also improves ROI and security. Learn about the 5 types of testing and where to focus against each area for maximum performance.

  • The Executive's Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.