Research Library

Powered by

Cybersecurity Research

  • A Next-Generation Approach to Vulnerability Management

    Sponsored by: Skybox Security

    Vulnerability scanning is the focal point for most enterprise vulnerability management programs. This white paper uncovers a next-generation approach to vulnerability management and how it can improve the security gaps within networks.

  • Stop Targeted Attacks Before they Stop your Business

    Sponsored by: Illusive Networks

    Access this resource to learn about Illusive's Deception Management System, a security tool where deceptions are perpetually designed, turned and tailored using AI so they appear—and remain—authentic to attackers.

  • CW ASEAN – February 2018: European data law: be aware and prepare

    Sponsored by:

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

  • 2018 Security Predictions

    Sponsored by: Splunk

    This resource offers predictions of 2018 and how machine learning and DevSecOps will impact and benefit security strategies.

  • How to Align with the NIST Cybersecurity Framework

    Sponsored by: SecurityMatters

    Many organizations are embracing the NIST Cybersecurity Framework to manage their cybersecurity risks. This e-book reveals how to align with the NIST Cybersecurity Framework, the 3 components of the framework and its benefits.

  • It's Time for a Smarter Approach: Threat-centric Vulnerability Management

    Sponsored by: Skybox Security

    Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.

  • GDPR and Vendor Risk Management

    Sponsored by: BitSight

    As many as 61% of global companies are not yet GDPR compliant, says BitSight's Elizabeth Fischer. Key into this Q&A interview regarding GDPR compliance and vendor risk management.

  • The next wave of IoT in Asia: What to expect in 2018

    Sponsored by:

    In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.

  • The Benefits of Network Monitoring for Industrial Automation

    Sponsored by: SecurityMatters

    Recently, there have been many cyberattacks occurring in the industrial automation world including the Mirai botnet, WannaCry, Non-Petya and more. This whitepaper reveals an approach to improving network security by assessing, detecting, responding, and preventing attacks.

  • The Rising Face of Cybercrime: Ransomware

    Sponsored by: BitSight

    This BitSight Insights Report examines the cybersecurity performance of nearly 20,000 organizations in the face of rising ransomware attacks. Uncover the report's 5 key findings about the different types of ransomware attacks across industries like education, government, and finance.

  • Third-Party Risk Management for Financial Services

    Sponsored by: BitSight

    Financial institutions are facing new, sophisticated, and highly dangerous threats from cybercriminals, including ransomware, DDoS attacks, fraud, and identity theft. This resource reveals helpful strategies for third-party risk management to help you protect sensitive data.

  • Making Risk Management More Effective With Security Ratings

    Sponsored by: BitSight

    With the growth and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of most significant risks that organizations face. This resource offers 3 risk management approaches organizations have taken to effectively improve their security.

  • Automate Firewall Change Management

    Sponsored by: Skybox Security

    This white paper examines the current challenges in managing firewall changes, the typical firewall change management cycle and the concepts of an automate workflow system that addresses these challenges.

  • The Path to GDPR Compliance

    Sponsored by: Digital Shadows

    In May 2018, GDPR comes into full force. But what does this regulation bring, and how do you prepare? This white paper outlines the 4 key steps towards GDPR compliance and 8 key changes to be aware of under GDPR.

  • Building a Secure Foundation to Reduce Cyber Risk

    Sponsored by: Tenable, Inc.

    According to the Dimensional Research survey "Trends in Cybersecurity Frameworks and Foundational Controls", 52% of respondents said their cybersecurity program has major gaps or weaknesses, or many minor ones. This resource offers a strategy for building a secure foundation to reduce cyber risks within your organization.

  • 3 Reasons: Why DevOps is a Game-Changer for Security

    Sponsored by: Tenable, Inc.

    Oftentimes, security teams have struggled with keeping pace with DevOps. This resource explores the intersection of DevOps and InfoSec and offers 3 reasons why security organizations will benefit by combining these 2 practices.

  • Cryptocurrencies are the New Frontier of Fraud

    Sponsored by: Digital Shadows

    In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.

  • Reducing Cyber Exposure from Cloud to Containers

    Sponsored by: Tenable, Inc.

    This resource offers insight from 29 cybersecurity professionals regarding how they are beginning their cyber exposure journey to protect expanding attack surfaces.

  • 13 Essential Steps to Meeting the Security Challenges of the EU GDPR

    Sponsored by: Tenable, Inc.

    This resource offers assistance to information security professionals in prioritizing changes and additions to their information security programs in preparation for GDPR.

  • Attack Your Attack Surface: How to Reduce Your Exposure to Cyberattacks

    Sponsored by: Skybox Security

    The average enterprise today must defend against exploitation of an attack surface composed of tens of thousands of potentially exploitable attack vectors on its networks and system. This resource offers insight into reducing exposure to cyberattacks with an attack surface visualization strategy.

  • The CSO Broad-Level Reporting Survival Guide

    Sponsored by: BitSight

    This 16-page survival guide dives into advancing the CSO/CISO-board relationship and why the board needs security leaders to fuel disciplined growth. Uncover what the board wants, how to present to the board, and tips to communicate with the board.

  • GDPR and the Regulatory Impact on Vendor Risk

    Sponsored by: BitSight

    Take a glimpse into this Q&A conversation to hear from security pros discussing the GDPR and the regulatory impact on vendor risk.

  • Five Milestones to GDPR Success

    Sponsored by: Proofpoint, Inc.

    The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant.

  • Mobile Fintech Fraud

    Sponsored by: Simility

    The world is becoming increasingly mobile centric and financial services are no exception. This resource addresses fraud challenges faced by mobile financial services, which can impact profit, reputation and customer loyalty.

  • Innovative Digital Bank Reduces Fraud by 70% While Increasing Business by 7x

    Sponsored by: Simility

    Explore this case study to gain insight into how Chime, a mobile financial company, overcame the challenge of fraudulent accounts by implementing a machine learning approach.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.