Research Library

Powered by

Risk Management Research

  • Data Science Operationalization

    Sponsored by: Dataiku

    There needs to be a common ground between data science and IT teams so that they can work together on data and analytics projects. Download this resource to explore strategies and procedures designed to bridge the gap between development and operationalization of data analytics projects within your organization.

  • Solving the Cybersecurity Skills Shortage

    Sponsored by: Arctic Wolf

    22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    Sponsored by:

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

  • Extreme Protection That Eliminates Data Loss for All of Your Oracle Databases

    Sponsored by: Oracle Corporation UK Ltd

    Get an in-depth look at the key advantages and organizational benefits of Oracle's Zero Data Loss Recovery Appliance to avoid loss of sensitive data, today.

  • Embracing Cross-Border eCommerce

    Sponsored by: Riskified

    North America is lagging behind in global eCommerce growth due to the fear of fraud. This resource shares best practices for effective fraud management when operating in new territories around the world so that you don't miss the opportunity to expand your business worldwide.

  • Managing User Risk: A Review of LogRhythm Cloud AI for User and Entity Behavior Analytics

    Sponsored by: LogRhythm, Inc.

    SANS analyst and cybersecurity professional, Dave Shackleford, takes an in-depth look at user and entity behavior (UEBA) solutions that take advantage of machine learning intelligence capabilities.

  • How Visibility of the Attack Surface Minimizes Risk

    Sponsored by: Skybox Security

    Attackers are being stealthy when they steal data, often targeting areas where visibility lacks. In this SANS resource discover the importance of visibility for minimizing security risk and enhancing security management.

  • Aiming for a Flawless Approach to Fraud

    Sponsored by: Riskified

    Take a look inside this report to learn more about insights into cosmetics shopping patterns and fraud trends, and best practices for effectively handling transactions without compromising users' shopping experience and safety.

  • Checklist for Managed Detection and Response

    Sponsored by: Arctic Wolf

    Are your certain your company hasn't been breached recently? Download this checklist to make sure you are properly assessing risk and monitoring and detecting threats.

  • Executing on NIST SP 800-190

    Sponsored by: Twistlock, Inc.

    When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.

  • 3 Secrets to Becoming a Mobile Security Superhero

    Sponsored by: Symantec

    Organizations are advised develop a consensus about adopting modern, advanced security technologies to protect mobile devices. Download to reveal 3 secrets that'll help you convince business leaders to buy-into mobile cybersecurity.

  • Report: Financial Services Threat Landscape

    Sponsored by: IntSights

    Prepare your organization for the future of cyberthreats. This white paper covers 5 cybersecurity predictions for 2019, global trends in cybersecurity, and much more.

  • Thinking Inside the Box: Preventing Fraud From the Inside Out

    Sponsored by: Riskified

    One of the first steps of preventing shipping fraud is figuring out how fraudsters get their hands on stolen goods in the first place. Download this e-book to learn about the methods fraudsters use and how knowing them can help retailers prevent future incidents.

  • How to Reduce Your Organization's Digital Attack Surface & Cyber Risk

    Sponsored by: IntSights

    Download this Forrester Research report to discover best practices and the best DRP tools to keep your organization protected.

  • Making Sense of Mismatches

    Sponsored by: Riskified

    In some cases, the presence of a mismatch translates to an instant red flag. But that is not always the case. This eBook provides insight into the most common types of mismatches found in good orders, including a deeper look at industry specific patterns, and how to handle them.

  • Advanced Data Protection Now Within Reach for Mid-Market Companies

    Sponsored by: InteliSecure

    Robust security programs are more accessible, affordable, and capable than ever before, helping confront a deluge of new regulations and cyber threats for mid-market companies, today. Download this white paper to see the real benefits of Managed Security Services.

  • Quantifying Business Risk to Optimize Data Security

    Sponsored by: InteliSecure

    Learn how to improve your company's data protection strategies, reduce security spending, and reevaluate your vulnerabilities with business risk and ROI assessments.

  • Your People are Your Biggest IT Security Threat

    Sponsored by: Rackspace Microsoft

    Take a look at the top 3 human risks and learn how training and risk controls can help to mitigate these threats.

  • Report: Securing the Enterprise Against Cyberattacks

    Sponsored by: Akamai Technologies

    71% of IT and security professionals say they struggle to prevent targeted threats from negatively impacting their enterprise. Read this full Ponemon Institute report to discover top obstacles and security practices as identified by IT and IT security professionals.

  • AI and Machine Learning in Your Organization

    Sponsored by: Splunk

    With machine learning-powered initiatives, you can detect issues before they paralyze your business. Download this resource for more on where you can apply machine learning and AI for insights.

  • Making Intelligent Decisions about Identities and their Access

    Sponsored by: IBM

    Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.

  • A Guide to Fraud in the Real World

    Sponsored by: Splunk

    In the digital era, fraud is becoming harder to prevent. Organizations are turning to machine data, which they can analyze to learn vital fraud prevention information. Download this report to learn how Duke University and several other organizations handled a fraudulent attack with machine data analysis.

  • Disaster Recovery/Business Continuity: Spotlight on ANZ

    Sponsored by: IBM

    In this e-guide, read about the IT outage at Woolworths that shut down checkouts and forced shoppers to leave their groceries behind, what you can do to avert a disaster through a recovery plan and the top business continuity risks you should be aware of this year.

  • The Hotel Hijackers

    Sponsored by: Panda Security

    Between booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.

  • Podcast: The Internet Never Forgets: How to Reduce Your Organization's Attack Surface and Cyber Risk with Digital Risk Reconnaissance

    Sponsored by: IntSights

    Join guest speakers, Nick Hayes, Forrester's Senior Security and Risk Analyst, along with Alon Arvatz, Chief Product Officer and Co-Founder of IntSights, for a discussion on the importance of Digital Risk Protection for enterprise security, compliance and risk teams.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.