ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Cb Defense

    Sponsored by: Carbon Black

    Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.

  • Ponemon Institute Application Security Risk Management Study

    Sponsored by: IBM

    This report shows you the results of the recent Ponemon Institute study entitled "How to Make Application Security a Strategically Managed Discipline". Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.

  • Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

    Sponsored by: IBM

    Discover how to formulate your own new endpoint protection strategy based around these ever changing endpoint devices. See how other organization are protecting their evolving perimeter and learn statistics from the SANS 2016 Endpoint Security Survey that will help you create your long-term endpoint management strategy.

  • IBM Information Lifecycle Governance Maturity Assessment

    Sponsored by: IBM

    Increasing storage and maintenance costs, duplication of resources, the lack of trusted content, and exposure to risks and litigation are problems plaguing many enterprises today. So why are company's holding on to every bit of data? Take this assessment to determine your level of information governance maturity and see how much more you can grow.

  • Rethinking Data Discovery And Data Classification

    Sponsored by: IBM

    Many see data discovery and classification as a Sisyphean task. This Forrester report breaks down why S&R pros struggle with data discovery and security and advises how to best approach data classification moving forward.

  • Cost of a Data Breach Calculator

    Sponsored by: IBM

    This short survey helps you identify your organization's risk profile, which includes your organization's risk of experiencing a data breach, the average cost per compromised record and the total cost of a data breach to your organization.

  • Mitigate Model Risk and Reduce Model-Related Costs

    Sponsored by: SAS

    By establishing risk mitigation and cost reduction strategies targeted at model implementation and operation, you can easily identify models that are vital for guiding the direction of your business. Discover an approach to model risk management that supports your internal decision-making processes.

  • The Anatomy of a Ransomware Attack

    Sponsored by: Exabeam

    Read this research report to understand the business models used by ransomware network operators and how you can detect and disrupt ransomware in your corporate environments.

  • The Four Steps to Effective Risk and Compliance Management for Financial Services

    Sponsored by: IBM

    This white paper illustrates why convergence is key to maximizing governance efforts and provides 4 steps financial services organizations can take to mitigate compliance risks.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • How Strongarm's Malware Protection Solution Works

    Sponsored by: eTECH Channel

    You need an efficient way to stop malware from damaging your customers' businesses. Discover simple and automated malware protection that will help you protect customer networks while minimizing complexity.

  • Take a Behavioral Bite Out of Crime

    Sponsored by: Infor

    44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.

  • The Security Survival Guide for Growing Businesses

    Sponsored by: Trustwave

    This guide shows you step by step why your security may be suffering and offer practical tips for addressing critical points so you can take your data protection to the next level.

  • Reference Guide: Acceptable Use Policy

    Sponsored by: Navex Global

    This reference guide provides an example of an acceptable use policy of computer systems at an organization. Use this sample as a guideline for developing your own policy.

  • Red Hat Product Security Risk Report 2015

    Sponsored by: Red Hat

    Tools that detect and address critical vulnerabilities before they go public are crucial to empowering developers. Explore reasons you should implement open source tools with security in mind.

  • 6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team

    Sponsored by: ThreatConnect

    This paper outlines 6 steps you can take to prioritize threat data, automate manual tasks, and streamline your workflow. With the right tools in place, you can turn your small band of brothers into an army suited to take down all of today's sophisticated threats.

  • IT Security for Retail

    Sponsored by: Trustwave

    This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.

  • Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader

    Sponsored by: Digital Guardian

    The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.

  • IT Security for Financial Sector

    Sponsored by: Trustwave

    Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next $50 million mistake.

  • 2016 Security Pressures Report

    Sponsored by: Trustwave

    The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.

  • 3 Steps to Create a Data Protection Lifecycle Management Strategy

    Sponsored by: Iron Mountain

    Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.

  • Security and Innovation Converge at Open Source Linux

    Sponsored by: Red Hat

    Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.

  • Migration Best Practices for Red Hat Enterprise Linux

    Sponsored by: Red Hat

    As IT systems age, they become more brittle. Download this white paper to understand the benefits of adopting the latest release of Red Hat Enterprise Linux—which will mitigate risk in the lifecycle of your server platform, and decrease the vulnerability of systems to security threats.

  • See Why Network Monitoring Tools are Critical in today's Hyperconnected World

    Sponsored by: eTECH Channel

    This e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.