ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Proofpoint

  • 2022 Cost of Insider Threats: Global Report

    Insider threat incidents have risen 44% over the past two years, with costs per incident up more than a third to $15.38 million, according to the 2022 Cost of Insider Threats: Global Report. Access now to unlock a comprehensive overview of these research findings.

  • Ransomware Attacks on the Rise - What You Need to Know

    Ransomware is one of today’s most disruptive forms of cyberattacks. Last year alone, the US experienced more than 65,000 ransomware attacks, according to a recent report. Tap into this webinar to learn the 3 ways ransomware threat actors get into your organization, how you can stop them in their tracks and more.

  • Winning the Fight Against Ransomware

    Not only is ransomware growing by 300% a year, but over 75% of ransomware attacks started with a phishing email. Watch this webinar to learn the methods attackers use to bypass traditional email gateway defenses, why ransomware and supply-chain-attacks are two sides of the same coin and more.

  • Measuring Security Awareness Impact for Long-Term Success

    This e-book explores in the ins and outs of security awareness programs built for long-term success. Read on to view strategies for championing, measuring, and nurturing stakeholder buy-in—and make the most of this critical investment.

  • 2022 State of the Phish

    Phishing has become something of an umbrella term to describe several different (but similar) email-based cyberattacks, including; bulk phishing, spear phishing, whaling, smishing, and more. Read this 2022 State of the Phish report for a closer look at 2021 email security stats and best practices for 2022.

  • Open Channels, Hidden Threats

    Social media and enterprise collaboration tools have changed the game when it comes to insider fraud risk. This e-book explores five major areas of risk stemming from social media platforms and enterprise collaboration tools. Access it here to explore a roadmap for solving these challenges.

  • Magic Quadrant for Enterprise Information Archiving

    Enterprise information archiving (EIA) solutions are designed for archiving data to satisfy information governance requirements. By 2025, 45% of regulated enterprise customers will conduct supervision of audio/video content to meet compliance requirements. Explore how EIA solutions are keeping up in this Forrester research report.

  • The Anatomy of an Insider Threat Investigation

    This visual e-book takes a step-by-step look at how to conduct an insider threat investigation in today’s current climate—both with and without a dedicated insider threat management (ITM) platform.

  • Redefining DLP

    Data loss prevention (DLP) in a modern cloud architecture is markedly different from years prior, requiring comprehensive solutions, high-quality vendor partnerships, and a people-first approach. Explore this white paper to understand the essentials of DLP in modern IT stacks and discover strategies you can use to foster employee buy-in.

  • The 10 Biggest and Boldest Insider Threat Incidents

    With more than 90% of successful cyberattacks requiring some level of human interaction, it’s never been more important to consider the potential of the insider threat. Explore this e-book to learn the 10 biggest and boldest insider threat incidents that have occurred in the last few years and discover how you can counter the next big one.

  • Building a Business Case for Insider Threat Management

    This Frost & Sullivan Insight report explores why executives, IT, legal and security operations teams aren't always aligned on the risks of insider risks and how to best manage them. Read on to learn more.

  • The 2022 Ransomware Survival Guide

    Ransomware continues to be one of today’s most disruptive types of cyberattack, with major incidents involving fuel, food and healthcare industries in 2021 – proving that no one is safe from these attacks. Read this ransomware e-guide to learn more about what to do before, during and after a ransomware attack.

  • Market Guide for Insider Risk Management Solutions

    Security and risk management leaders have observed an increase in demand for assessing and managing insider risk, including surveillance of high-risk workers and anomaly monitoring of critical applications and data. Read this Gartner Market Guide for Insider Risk Management Solutions to better understand and implement insider risk management.

  • Protecting Your Number 1 Threat Vector

    Almost every modern cyberthreat involved humans – either as the target, the catalyst or the adversary. This webinar explores how the cyberattack landscape has changed to be more human-focused and offers 6 best practice for how your organization can shift security practices to be more people-centric. Watch now to get started.

  • Driving Real Behaviour Change to Email

    People are increasingly becoming the most common target for today’s cyberattacks – but identifying and proactively protecting those at the greatest risk can be nearly impossible. Watch this webinar to learn how to build a security awareness program that is both people-centric and future-proof.

  • Unmasking BEC And EAC

    The FBI has recognized business email compromise (BEC) and email account compromise (EAC) as one of the most pervasive and costliest cyberthreats in circulation. In fact, the average attack nets the attacker nearly $130,000. To learn more about BEC and EAC and how to prevent it, read this e-book.

  • The Hidden Costs Of Free

    As organizations opt for third-party email platforms, like Microsoft 365, it becomes increasingly critical that they ensure security is up to snuff. Unfortunately, Microsoft 365’s native security features may not be best-fit for every user. Read this e-guide to learn more about how to make the most out of Microsoft 365.

  • Stopping BEC And EAC

    Gartner predicts that business email compromise (BEC) attacks will double each year, totaling $5 billion in actual losses by 2023. So, how should CISOs protect their organizations against this growing threat? Download this exclusive e-book for insight into BEC and email account compromise (EAC) trends, challenges and best practices.

  • The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud

    With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).

  • Compliance in the Age of Digital Collaboration

    Access this e-book to learn how to explore the challenges of capturing and managing a growing volume and diversity of business communications as well as how to solve today's toughest compliance challenges.

  • The Complete Guide to Migrating Your Enterprise Archiving System

    Check out this e-book for a complete guide to migrating your enterprise archiving system and learn everything you’ll need to know about moving to the cloud.

  • Best Practices: Mitigating Insider Threat

    Malicious activity from insiders is especially difficult to detect because they’re users privileged access to data. However, they’re also entitled to privacy and due process, so security pros must handle these incidents with greater care than external threats. Download this Forrester report to learn 6 best practices for mitigating insider risk.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.