ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Coalfire

  • Offensive Security Comes of Age: From Point in Time to All the Time

    By studying new attacks, and analyzing adversarial behavior, organizations can better track and understand attackers, their goals and their tactics. Download this report on the state of penetration risk to unlock statistics and information that you can use to develop a threat-informed cybersecurity strategy for your organization.

  • FedRAMP® strategy guide

    For organizations that do business with the US government, then you’re aware of FedRAMP as their center of IT modernization. Their Cloud Smart policy requires that agencies use FedRAMP authorized solutions. To not miss out on these opportunities, leaders can ensure their business approaches FedRAMP the right way. Read on to learn how.

  • Compliance Report 2023

    While in the past compliance was seen as a bureaucratic necessity, many have now realized the full potential of compliance. In this report, experts from Coalfire discuss the state of compliance, taking a deeper look at how compliance has grown into the preferred method for fighting threats at scale. Read on to learn more.

  • The State of CISO Influence 2023

    CISOs and cybersecurity policy play a much more important role in business decisions than ever before. This is despite the fact that the majority of large and small companies spend less than $5 million annually on cybersecurity. Access the State of CISO Influence report here to learn about the state of security.

  • System and Organization Controls (SOC) reports: Understanding the differences

    System and Organization Control (SOC) reports are valuable tools for organizations to help build trust in their security and controls posture. Access this guide to learn key differences among the 5 SOC reports offered by Coalfire to help you understand the purpose of each report type and how it benefits a particular audience.

  • HITRUST CSF® Certification FREQUENTLY ASKED QUESTIONS

    The HITRUST Common Security Framework (CSF) was developed by IT and healthcare professionals to provide a framework for managing the security requirements inherent in the Health Insurance Portability and Accountability Act (HIPAA). Find more about some of the answers to the most common questions in this document.

  • A strategic approach to sustaining HIPAA compliance

    Tap into this white paper to learn how you can efficiently manage your HIPAA program in a strategic fashion by assigning track leaders that are responsible for key elements of your HIPAA program.

  • Application Security Champions Report

    This application security champions report dives into how AppSec champion programs operate, what best practices are, and why you should consider adopting one for more consistent and secure software. Access it here.

  • Smartest path to DevSecOps transformation

    In this CIO/CISO guide, discover the tenets of DevSecOps transformation as described by industry experts, covering everything from preparation to the secure development lifecycle to automation.

  • THIRD PARTY RISK MANAGEMENT: A PATH TO A PROGRAM

    This white paper dives into what risks third-party management faces and how it can change the course of a cyber program. Read on to learn more.

  • What Healthcare Executives Must Know About Data Breaches

    BYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.