Research Library

Powered by

Risk Management Research

  • How to Prevent Data Breaches

    Sponsored by: SkOUT

    How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.

  • Testing for Compliance Just Became Easier

    Sponsored by: Cymulate

    Compliance regulations originated as efforts to ensure data security, but they have morphed into overwhelming challenges for IT and security teams. In this white paper, learn how Cymulate's Breach and Attack Simulation can ensure your organization is audit-ready while also measuring the level of risk across your threat vectors and infrastructure.

  • 5 Ways to Reduce Risk and Boost Productivity

    Sponsored by: Citrix

    While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.

  • Anybody Home? Vulnerability Scans vs. Penetration Tests

    Sponsored by: SkOUT

    This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.

  • Real-Time Anomaly Detection at Scale: 19 Billion Events per Day

    Sponsored by: Instaclustr

    Read this white paper to learn how to utilize open source software and the cloud to enable scalable anomaly detection in your organization with the capability to process 19 billion events in a single day.

  • Industry Cyber-Exposure Report

    Sponsored by: Rapid7

    Rapid7's recently conducted a cybersecurity test to measure exposure and resiliency in the United Kingdom. They measured the Internet-facing security profiles of the FTSE 2501 plus a handful of non-FTSE 250 members. Explore the results in this report.

  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse in Salesforce

    Sponsored by: FairWarning

    Privileged Salesforce users are necessary to every organization however, with the ability to make nearly unlimited changes; they place your organization at tremendous risk. In this white paper, explore 4 best practices for preventing privileged user abuse in Salesforce.

  • Understanding What's at Stake with Privileged Accounts

    Sponsored by: One Identity

    In this video transcript, two security experts from One Identity talk about how Privileged Access Management is not just about securing passwords and how there's much more that needs to be done to keep your enterprise safe.

  • What Is Phishing and What Are Top CISOs Doing About It?

    Sponsored by: Inky Technology

    In the last year, different types of phishing attacks have begun to emerge. One example is a wire transfer scam in which attackers steal money from companies after suggesting an overdue bill or unpaid invoice. Download this blog to explore different types of phishing attacks and see what businesses can do to prevent them.

  • Protecting the End User

    Sponsored by: Proofpoint

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organizations can take to build a people-centric defense.

  • Increase Agility and Workload Performance via Hybrid

    Sponsored by: Dell and Intel®

    Discover how hybrid cloud compares to other ill-advised cloud strategies, including five features that can mirror the best capabilities of on-premises infrastructure.

  • How to Protect Against Today's #1 Security Risk: Employees

    Sponsored by: TeleApps

    It is important to offer a compelling and engaging employee experience (EX) to attract top employees. However, organizations must remember that just as demand for positive EX is growing – so are security risks. In this white paper, explore the needs of modern workers, the security risks that come with that and how your business can stay protected.

  • CyberArk PAS Assessment Tool

    Sponsored by: CyberArk Software, Inc

    The commonality in most data breaches and cyberattacks is the exploitation of privileged accounts, credentials and access keys. In this solution brief, learn how CyberArk's Privileged Access Security Assessment Tool can help you evaluate your current privileged access security risk and vulnerabilities.

  • Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance

    Sponsored by: HackerOne

    Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.

  • Webcast: Solutions for Privileged Account Resilience

    Sponsored by: One Identity

    Tune into this informative webcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.

  • Is Your Business Data Protected? Take Our 5 Question Data Security Quiz to Find Out

    Sponsored by: ECi

    Is your data protected enough? Take this data security quiz to determine if your level of data security is adequate for your business.

  • The Zenefits Bug Bounty Story

    Sponsored by: HackerOne

    Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.

  • Salesforce Uses Bug Bounties to Protect Customer Data

    Sponsored by: HackerOne

    Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.

  • The Total Economic Impact Of Alert Logic SIEMless Threat Management

    Sponsored by: Alert Logic

    Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.

  • Is Your Data As Protected As It Should Be?

    Sponsored by: ECi

    In this white paper, discover how to create and implement an improved data protection strategy with cloud computing. Explore the benefits of cloud computing in data protection, and decide if cloud computing is right for your organization.

  • Enterprise Collaboration: Benefits, Misalignment's, and Risks

    Sponsored by: Adobe Systems Incorporated

    In this white paper, learn how to address common enterprise collaboration and digital transformation challenges by addressing corresponding data privacy, data security, and regulatory compliance obstacles. Additionally discover how collaboration initiatives can help your organization accelerate decision-making, increase productivity, and more.

  • How to Address Governance, Risk and Compliance In Your Organization

    Sponsored by: Optiv

    Compliance is a growing concern for many companies, especially as new regulations and technologies are introduced. In this e-guide learn how to create a GRC program to better help organizations achieve their goals by ensuring events that threaten the continued operations of the organization can be identified, prevented and mitigated if they occur.

  • Episode 3: The Compromise

    Sponsored by: Proofpoint

    This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how unintentional insider behaviors can lead to credential compromise and wire transfer fraud.

  • Episode 2: The Attack

    Sponsored by: Proofpoint

    This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.

  • Episode 1: Good Jan, Bad Jan

    Sponsored by: Proofpoint

    This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download the video to further explore the risks associated with unlocked PCs and poor password security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.