ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Proofpoint

  • The Role of Insider Threat Management Software Platforms

    As workplace trends and cyberthreats evolve, so too should the methods used to mitigate risk and ensure user protection. This e-book takes a closer look at the growing risk of insider threats and explores the capabilities of the ObserveIT platform, Proofpoint’s insider threat management software platform.

  • Insider Threat Management and Cybersecurity Tools

    The traditional notion of a perimeter is a thing of the past, people are the new perimeter. In this e-book, discover the tools and tactics organizations are using to defend against insider threats – evaluating the strengths and weaknesses of each approach and underlining the importance of people-centric security.

  • An Overview of Insider Threat Management

    The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.

  • A Guide to Setting Up Your Insider Threat Management Program

    In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.

  • You've Got BEC!

    BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.

  • 2019 Proofpoint Domain Fraud Report

    Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.

  • Human Factor Report

    Download the Human Factor Report, based on threat data from more than a billion email messages per day, to learn how attackers exploit human nature to trick users into installing malware, wiring money in fraudulent transactions, handing over sensitive data, and more.

  • Insider Threat Management - Securing the Remote Worker and Enabling Business Continuity

    In this brief, learn how a people-centric Insider Threat Management solution can help provide the necessary context around user and data activity to protect against costly data loss, system misuse and/or brand damage that can be caused by remote insiders.

  • A Visual Guide to Insider Threat Investigations

    What does an insider threat mean? The truth is, at times, it can be very abstract. And while there is value in understanding the principles and best practices that underlie a strong security program, it can also be very helpful to see for yourself what a given process actually looks like. Download this e-book to learn more.

  • 2020 Cost of Insider Threats Global report

    Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.

  • Looking within: The Hidden Costs of Insider Threats

    Whether it’s careless users, disgruntled employees or compromised accounts, the cost of insider threats is on the rise. The infographic provides a closer look at the statistics and insights regarding the dangers of insider threats. Download now to learn more.

  • Cyber Insecurity: Managing Threats from Within

    Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.