Research Library

Powered by

Cybersecurity Research

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • Italy's Largest Service Provider Leverages Security to Address Cybercrime Threats

    Sponsored by: Cisco Umbrella

    As multiple studies revealed that Italy’s businesses grew increasingly vulnerable to data breaches & cyberattacks, Telecom Italia (TIM) was already working on a way to protect its 600,000+ customers from cybercrime. In this case study, discover how TIM was able to leverage security to meet this challenge.

  • The Changing Face of Data Security in Europe

    Sponsored by: Thales

    Take a glimpse at the results from the 2019 Thales Data Threat Report – European Edition. This infographic shares some key statistics from the research findings, including the use of sensitive data, multi-cloud environments & the effects of GDPR and other data privacy laws.

  • The Road to Security Operations Maturity

    Sponsored by: Siemplify

    Modern security operations (SecOps) programs aren’t meeting performance needs, and there is little consensus on how to improve this. In order to address this, the Cyentia Institute recently conducted research into the SecOps journeys of a variety of organizations. Read on to uncover the key findings from their study.

  • 5 Reasons You Should Automate Cybersecurity Incident Response

    Sponsored by: Ayehu

    Making security automation a core element of enterprise IT defense schemes isn’t just a dreamy vision of the future. It’s a reality that’s available & working today. In this e-book, discover the top 5 reasons you should automate your organizations’ responses to cybersecurity.

  • The No-Nonsense Guide to Security Operations Metrics

    Sponsored by: Siemplify

    Given that it’s difficult to define & measure success when it comes to cybersecurity, companies must carefully consider the appropriate KPIs to use when setting their security goals. In this guide, learn about how business, operational & improvement metrics can measure the efficacy of your cybersecurity operations program.

  • Identity & Access Management – Securing the Modern Workplace With Microsoft 365

    Sponsored by: Core BTS

    Cyberthreats are the top concern among leaders heading up companies of all sizes, and identity and access management (IAM) is a foundation of enterprise cybersecurity. In this white paper, discover how to secure the modern workplace with Microsoft 365.

  • Integrating Password and Privilege Management for Unix and Linux Systems

    Sponsored by: BeyondTrust Corporation

    With the knowledge that cyberattacks are often targeted towards accounts with privileged access, organizations often include privileged access management (PAM) at the top of their project list. This report uncovers why PAM strategies are critical to a robust security program.

  • Vormetric Data Security Platform Architecture

    Sponsored by: Thales

    As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.

  • Network Security Made Simple

    Sponsored by: Cisco Umbrella

    The volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses are not enough. In this e-book, discover challenges facing today’s security professionals and explore some simple actions you can take to reduce malware, simplify security and improve network performance.

  • Certificate Lifecycle Management and Automation

    Sponsored by: AppViewX

    Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.

  • Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities

    Sponsored by: Fidelis

    When it comes to developing a security strategy, organizations should strive to view their entire environment as a single landscape. Critical to this is endpoint security, which enables organizations to monitor activity, track behavior & detect threats. In this paper, dive deeper into the advantages of endpoint security capabilities.

  • Buyer’s Guide for Complete Privileged Access Management (PAM)

    Sponsored by: BeyondTrust Corporation

    Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.

  • Learnings from The Frontlines: 4 Steps to Protect What Attackers Are Really After

    Sponsored by: Cyber-Ark Software

    Forrester estimates that 80% of security breaches involve privileged credentials & it makes sense why: attackers are targeting those who have access to sensitive data & infrastructure. In this guide, discover how to think like an attacker in order to develop a security strategy to protect your critical assets.

  • Defense in Depth: Key Learnings for Achieving Detector and Response

    Sponsored by: Verizon

    Join Gene Stevens and Dave Gold, executive leaders from ProtectWise who will discuss the essential components of a robust detection and response strategy. They will talk about the limitations and challenges with the security models that many organizations still have in place today.

  • Just-In-Time (JIT) Privileged Access Management (PAM)

    Sponsored by: BeyondTrust Corporation

    Always-on privileged access presents a massive risk surface to data breaches, & traditional security is limited in their detection against these threats. A strategy called just-in-time (JIT) privileged access can help by limiting the time an account has certain access. Read more about JIT & why you should include it in your policy.

  • Executive Summary 2019 Thales Data Threat Report

    Sponsored by: Thales

    European enterprises are moving quickly to adopt and deploy transformative technologies to increase their efficiency, while also introducing new risks. Technology changes & data privacy laws are forcing companies to rethink how they provide data security. View this report for top data concerns and threat mitigations in 2019.

  • Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities (video)

    Sponsored by: Fidelis

    In this video, Matt Bromiley, SANS Analyst and Incident Responder, and Gerald Mancini, Senior Vice President of Engineering at Fidelis, discuss elevating enterprise security with Fidelis Cybersecurity in the endpoint security platform. Watch to learn more.

  • Do You Know DNS Security?

    Sponsored by: Cisco Umbrella

    Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? Download this resource to test your DNS security knowledge with an 8-question interactive quiz.

  • Scaling Your Data Privacy Program

    Sponsored by: Ionic Security

    When building out a privacy program, businesses need to consider the relationship between security, privacy and compliance. Organizations should look to strike a balance in order to meet regulatory requirements and customer perception at scale. How does your organization tackle privacy? In this guide, uncover some industry best practices.

  • Privileged Access Threat Report 2019

    Sponsored by: BeyondTrust Corporation

    2020 is approaching and issues around employee & vendor access are not going away. But it’s possible to improve the visibility of threats & increase the confidence over an IT environment’s security. That’s where Privileged Access Management (PAM) comes into play. View this report for tips on managing insider access, vendor risk & more.

  • Five Steps To A Zero Trust Security Strategy Q&A

    Sponsored by: Ionic Security

    Following a recent webcast on the zero-trust approach, Stephanie Balaouras, Vice President, Research Director for Security & Risk at Forrester Research participated in a Q&A with audience members. Review some of Balaouras’ insights on data-centric security strategy approaches.

  • Who’s Stalking Mobile App Users?

    Sponsored by: The Media Trust

    It’s difficult to disagree with the convenience of mobile applications, but have you ever considered the data being captured? Consumer awareness and regulations like GDPR & CCPA are creating a dramatic shift in app development and experience. In this report, find hidden vulnerabilities, the role of cookies & other findings.

  • Elevating Enterprise Security with Fidelis Cybersecurity: Network and Deception

    Sponsored by: Fidelis

    As organizations adopt cloud technologies and regulatory requirements, networks grow increasingly complex. Security teams are finding it difficult to defend their networks without holistic insight into the environment. Does your security team have the visibility and investigative ability to defend your network? Read on to find out.

  • DevSecOps and the Problem of Machine-Scale Data

    Sponsored by: Ionic Security

    The amount of data being created daily is growing exponentially, and manual processes can’t scale. With data growth comes increasing complexity and higher importance for security to be integrated into the SDLC. Discover the opportunities and threats of machine-scale data, how to maintain agility, and the implications this has for DevSecOps.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.