ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • CyberArk PAS Assessment Tool

    Sponsored by: CyberArk Software, Inc

    The commonality in most data breaches and cyberattacks is the exploitation of privileged accounts, credentials and access keys. In this solution brief, learn how CyberArk's Privileged Access Security Assessment Tool can help you evaluate your current privileged access security risk and vulnerabilities.

  • Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance

    Sponsored by: HackerOne

    Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.

  • Webcast: Solutions for Privileged Account Resilience

    Sponsored by: One Identity

    Tune into this informative webcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.

  • The Zenefits Bug Bounty Story

    Sponsored by: HackerOne

    Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.

  • Salesforce Uses Bug Bounties to Protect Customer Data

    Sponsored by: HackerOne

    Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.

  • The Total Economic Impact Of Alert Logic SIEMless Threat Management

    Sponsored by: Alert Logic

    Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.

  • Quantifying the Operational and Security Results of Switching to Forcepoint NGFW

    Sponsored by: Forcepoint

    The distributed nature of many organizations and the changing nature and scale of threats are creating new pressures related to network security. In this IDC study, learn how Forcepoint Next Generation Firewall can serve as a core component of organizations' efforts to protect their networks against common threats.

  • How to Address Governance, Risk and Compliance In Your Organization

    Sponsored by: Optiv

    Compliance is a growing concern for many companies, especially as new regulations and technologies are introduced. In this e-guide learn how to create a GRC program to better help organizations achieve their goals by ensuring events that threaten the continued operations of the organization can be identified, prevented and mitigated if they occur.

  • The Practical Executive's Guide to Data Loss Prevention

    Sponsored by: Forcepoint

    There has been much confusion in the marketplace regarding data loss prevention (DLP) controls. As a result, organizations that want to protect their confidential data and comply with laws and regulations are often unsure where to turn. In this white paper, explore a 9-step process for implementing and executing a data protection strategy.

  • Episode 3: The Compromise

    Sponsored by: Proofpoint

    This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how unintentional insider behaviors can lead to credential compromise and wire transfer fraud.

  • Episode 2: The Attack

    Sponsored by: Proofpoint

    This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.

  • Episode 1: Good Jan, Bad Jan

    Sponsored by: Proofpoint

    This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download the video to further explore the risks associated with unlocked PCs and poor password security.

  • Who needs malware? How Adversaries use Fireless Attacks to Evade your Security

    Sponsored by: CrowdStrike

    According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.

  • Avoid the Breach With Effective Application Security Testing

    Sponsored by: HackerOne

    Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.

  • Cybersecurity Heroes Aren't Born... They're Made

    Sponsored by: Proofpoint

    As organizations have become more open to delivering security awareness training, phishing has become a primary focus. But, email is just one of many mediums at cybercriminals' disposal. In this webcast, Gretel Egan discussed best practices and actionable tips for improving the effectiveness of your security awareness training activities.

  • The Insider Threat: Real Defense for Real Businesses

    Sponsored by: Proofpoint

    How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, Kate Burnell, Global Insider Threat Specialist at Dtex Systems and Kurt Wescoe, Chief Architect at Wombat Security discuss how cybersecurity professionals can address the insider threat without shutting down business.

  • Swinburne University of Technology Meets Its Essential 8 Mandate

    Sponsored by: Ivanti ANZ

    Following a risk assessment, Swinburne University determined that following the ASD Essential 8 recommended cybersecurity mitigation strategies would help ensure the strongest form of defense against a cyberattack. In this case study, learn how Swinburne was able to implement the ASD Essential 8 by implementing Ivanti's security portfolio.

  • The ASD Essential 8 and Ivanti

    Sponsored by: Ivanti ANZ

    Implementing the ASD Essential 8 effectively helps you achieve a baseline for your cybersecurity strategy. While this sounds straightforward, many companies still struggle to achieve this level of security today. In this white paper, learn about the importance of each control that makes up the Essential 8.

  • Ivanti Cloud: Real Time Insights and Recommendations

    Sponsored by: Ivanti ANZ

    Ivanti Cloud identifies risks and opportunities enterprise-wide, then recommends and automates next steps. In this resource, explore the benefits of Ivanti Cloud.

  • Securing your Cloud Applications

    Sponsored by: Forcepoint

    The average enterprise customer uses over 1,000 cloud apps, including SaaS, IaaS, or homegrown cloud apps. To mitigate security risks, IT leaders must ensure assets in these cloud environments are secure. View this webcast to learn how to gain insight into employee cloud app use, receive automated threat prevention and more with Forcepoint CASB.

  • Governance, Risk, and Compliance: Analyst Report

    Sponsored by: ServiceNow

    In this Forrester Total Economic Impact report, discover a framework to evaluate the potential financial impact of ServiceNow GRC on your organization.

  • What is an Ounce of Cybersecurity Prevention Worth?

    Sponsored by: Verizon

    Data breaches and their costs are a major risk to your business. But they are a risk that can be mitigated. Understanding theft tactics based on the experiences of others is critically important. In this resource, explore tactics to help prevent data breaches and security holes in your organization.

  • Security Maturity: Mapping the Road to Resilience in Europe

    Sponsored by: Dell SecureWorks

    The road to cybersecurity maturity can be tricky. This is because there isn't one universal standard by which management can determine how well the risk is being managed. For European organizations, reviewing the highlights in this white paper can provide clues for comparing their own cybersecurity maturity to that of other EMEA organizations.

  • Digital Transformation Executive Report

    Sponsored by: Dell SecureWorks

    Businesses are more dependent on technology than ever before. While digital transformation brings about opportunity, it also introduces large amounts of risk. In this white paper, learn how organizations can create a decentralized security partnership approach between security, IT and citizen developers.

  • 5 Ways CIOs Can Optimize Communication With Other Executives

    Sponsored by: BitSight

    Despite the fundamental importance of information technology and security, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.