Research Library

Powered by

Cybersecurity White Papers

  • The Evolving Role of CISOs and their Importance to the Business

    Sponsored by: F5 Networks

    Explore this 67 page Ponemon Institute Security Report to gain insight into the evolution and influence of CISOs through interviews with 184 companies regarding insights, challenges and approaches to security in today's global threat landscape.

  • A Matchmaker's Guide to UBA Solutions

    Sponsored by: Rapid 7

    Gartner predicts that by 2020, less than 5 stand-alone user behavior analytics (UBA) solutions will remain in the market, with most vendors focusing on specific use cases and outcomes. This paper offers a list of questions to help you pick the right UBA strategy to confirm your company's protection far into the future.

  • DDoS: Strategies for Dealing With a Growing Threat

    Sponsored by: A10 Networks

    In 2015, 10% of average DDoS attacks were above 50 Gbps. Today the average size of attacks greater than 50 Gbps quadrupled to 42%. This IDG paper provides research on recent DDoS attacks and compares the data to a similar study conducted a few years ago to discover what measures organizations need to take now to prevent the attacks.

  • Achieve SIEM Solution Success

    Sponsored by: Rapid 7

    In order to unify data, reliably detect attacks, and identify risk across your organization, a SIEM deployment is necessary. This white paper offers Gartner's 6 challenges of the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.

  • Hyland Ensures Growth with High-Performance, Intelligent Network Security

    Sponsored by: Juniper Networks, Inc.

    In this case study, discover how Hyland, a developer of enterprise content management solutions was empowered to build a stronger network security strategy that allowed employees to collaborate freely with each other, customers and partners with no impediments.

  • Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive

    Sponsored by: Juniper Networks, Inc.

    In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way

  • The Evolving Risk Landscape

    Sponsored by: F5 Networks

    There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.

  • Damage Control: The Impact of Critical IT Incidents

    Sponsored by: Splunk

    IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This Quocirca research report analyzes the impact critical IT incidents have on organizations, which halt business processes and impact users.

  • The Clock is Ticking on GDPR Obligations

    Sponsored by: IBM

    GDPR gives organizations 72 hours to report a data breach, while discovery usually takes a company 150 days. Take a look at this article to discover ways your organization can prepare for GDPR to ensure you are compliance ready by May 2018.

  • The Hunt for IoT

    Sponsored by: F5 Networks

    30.6 million IoT brute force attacks were launched from January 1 to June 30 2017. This white paper provides an analysis of data collected pertaining to the rise of thingbots in Europe, specifically focusing on the Mirai and Persirai bots containing destructive malware.

  • Auto Scaling Security on AWS: Maintaining a Dynamic Security Posture on the Cloud

    Sponsored by: AWS - Fortinet

    Don't be intimidated by the cloud migration process. This white paper explores how you can confidently move business-critical applications to the cloud while maintaining security and availability with Amazon Web Services (AWS) auto scaling and NGFWs.

  • Bots Mean Business

    Sponsored by: F5 Networks

    As bot technology, machine learning, and AI continue to evolve, so will the cyber threats they pose. This paper explores how bot innovation enables cybercrime and how you can optimize business intelligence while protecting your enterprise.

  • Using AI, Machine Learning and Other Advanced Technologies to Stay Ahead of Cybercrime

    Sponsored by: Juniper Networks, Inc.

    In this study, research specialist Vanson Bourne interviewed 400 IT and security professionals to learn how they're putting new technologies like AI and machine learning to strengthen existing security procedures.

  • Top Cyber Threats to the Technology Sector

    Sponsored by: Digital Shadows

    Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.

  • Top Cyber Threats to The Retail Sector

    Sponsored by: Digital Shadows

    Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.

  • The Pressing Need for Digital Risk Management

    Sponsored by: Digital Shadows

    According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.

  • Inside Online Carding Courses Designed for Cybercriminals

    Sponsored by: Digital Shadows

    Experts project a loss of $24 billion to payment card fraud by the end of 2018. This paper looks at an online course designed for bad actors in order to shed light on the latest fraud tactics and tools, allowing consumers, merchants and credit card companies to better understand the threat and protect themselves from becoming the next fraud victim.

  • Top Cyber Threats to the Legal Sector

    Sponsored by: Digital Shadows

    Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.

  • Top Cybercrime Threats to Financial Institutions

    Sponsored by: Digital Shadows

    The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.

  • Protect Your Customer and Employee Accounts

    Sponsored by: Digital Shadows

    Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.

  • The Complete Guide to Building a Security Culture

    Sponsored by: Trustwave

    IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.

  • CW ASEAN – November 2017: How managed security services help to reduce cyber risk

    Sponsored by:

    In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of.

  • Equifax Breach: Lessons Learned for your Organization

    Sponsored by: Digital Shadows

    The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.

  • CW ANZ – November 2017: On cyber alert

    Sponsored by:

    In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security.

  • Fintech & the digital customer experience

    Sponsored by:

    In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.