ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Just in Time Access

    Sponsored by: Identity Automation

    As the number of employees, vendors, contractors, and departments within an organization grows, the complexity associated with managing access to applications and systems does too. This e-book offers an IAM approach for managing user access within your organization.

  • How to Minimize the IAM Risks Associated with Third-Party Relationships

    Sponsored by: Identity Automation

    According to a Deloitte survey, 94.3% of companies are not confident in the tools used to manage third-party risk. Discovery a variety of ways to increase your IAM approach to mitigate the risks of third-party relationships.

  • Top 10 Keys to Successful Least Privilege Adoption

    Sponsored by: Thycotic

    According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.

  • Security Obligations for Enterprises Using Cloud Services

    Sponsored by: Oracle Corporation

    77% of organizations have already adopted cloud services and 10% of those companies using cloud services describe themselves as heavy users, according to Oracle. Explore this white paper to gain insight into the shared responsibility model as well as cloud using security techniques.

  • What Keeps Me Up At Night?: Concerns of a CISO

    Sponsored by: enSilo

    Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.

  • Security Research Shows AV & NGAV Can Be Evaded

    Sponsored by: enSilo

    Process Doppelganging is a new evasion technique targeting Windows systems. Take a look at this webinar to uncover the history of evasion techniques as well as strategies for attack protection.

  • Assigning Risk Levels & Choosing Authentication Policies

    Sponsored by: Identity Automation

    Different types of employees carry different levels of risk. But how do you know the appropriate level of risk for any given employee? This resource reveals tactics for assigning appropriate risk levels and choosing authentication policies to ensure successful security within your enterprise.

  • Mitigate the Top 9 Cloud Threats with a Cloud Access Security Broker (CASB)

    Sponsored by: Oracle Corporation

    According to Cloud Computing Trends: 2017 State of the Cloud Survey, today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).

  • Enabling Healthcare with Trusted Access

    Sponsored by: Duo Security

    Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.

  • Financial Institution Security

    Sponsored by: enSilo

    Reviewing and selecting endpoint products to protect a financial institution's servers and ATM's is an extensive process.This resource offers strategies for improving security and downtime within financial institutions.

  • Security within the Financial Services Industry

    Sponsored by: enSilo

    There has been an increase in "file-less malware" as it goes undetected in most organizations. Attackers' motivation is driven by financial gain, so targeting the banking industry with attacks is common. Take a look at this resource to uncover how to improve security within the financial industry to protect against dangerous malware variants.

  • Market Guide for Endpoint Detection and Response Solutions

    Sponsored by: enSilo

    The endpoint detection and response (EDR) market is rapidly growing as security and risk management leaders seek adaptive security architecture. Take a look at this Gartner Market Guide to uncover various endpoint detection and response strategies.

  • 4 Reasons Why IAM Should Be the Core of Your Security Program

    Sponsored by: Identity Automation

    As businesses embrace BYOD policies and more employees work remotely, companies need to change the way they view the threat landscape. Explore this e-book to uncover how to increase security in a perimeter-less global business environment by advancing IAM.

  • Always on GDPR - The Visibility to Act Like the Pros

    Sponsored by: Nuix

    The GDPR is estimated to implement $5.3 billion in fines by 2021, according to Nuix. To avoid the strict fines imposed by the regulation, a successful compliance strategy is critical. This resource offers an approach to effectively securing personal data through a more advanced method than your average cybersecurity strategy.

  • Contingent Workers

    Sponsored by: Identity Automation

    By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.

  • The Good Shepherd Model for Cybersecurity, Privacy, And Regulatory Compliance

    Sponsored by: Nuix

    Data breaches are inevitable - If you can't prevent hackers or insiders from getting into your organization's network, it's vital to minimize the damage they can cause. This white paper reveals four rules for protecting private data to improve compliance with privacy regulations.

  • Connected Intelligence: GDPR and Incident Response

    Sponsored by: Nuix

    The GDPR will force organizations to reexamine how they handle consumers' personal information. Data breach investigations in just 72 hours —are you prepared? This white paper offers GDPR and incident response preparation strategies to ensure your enterprise is ready for the upcoming regulation.

  • The Trouble with Phishing

    Sponsored by: Duo Security

    Phishing is one of the most common threats hitting organizations and it is only getting worse. This guide offers insight into the problems around phishing, how it happens, and what your organization can do to defend against the damaging attacks.

  • Automated Endpoint Security Realized

    Sponsored by: enSilo

    Modern malware is evolving at a rapid rate and most traditional security defenses are failing to detect it in an efficient timeframe. Take a look at this resource to uncover how to leverage endpoint security to protect against damaging malware attacks targeting your enterprise.

  • Broadcast Media Case Study

    Sponsored by: enSilo

    Explore this case study to gain insight into how companies within the broadcast media industry overcame the challenge of phishing campaigns targeting their enterprises.

  • Securing the Modern Enterprise

    Sponsored by: Duo Security

    The most difficult aspect of an enterprise to control is the human element. This white paper provides enterprises with strategic approaches for securing the enterprise and protecting against its weakest vulnerabilities.

  • A Practical Guide for GDPR Compliance

    Sponsored by: Nuix

    Most organizations are not yet adequately prepared for compliance with the GDPR. In fact, 64% of organizations are not ready to comply with the requirements. This white paper offers a practical guide for GDPR compliance, including insight into why the GDPR is important and its essential requirements.

  • The GDPR Playbook

    Sponsored by: Proofpoint, Inc.

    Is your business, brand reputation, and bottom line worth preserving? In order to comply with the GDPR and avoid the harsh penalties, creating a plan with the new rules is critical for all organizations. This GDPR playbook provides a roadmap to compliance and 7 key principles to know before May 2018.

  • Stripping the Malware Threat Out of PowerShell

    Sponsored by: enSilo

    This white paper provides insight into PowerShell and how it is being leeched onto by threat actors. In addition, learn how to protect your endpoints against this increasing threat.

  • Vulnerable By Design: Why Destructive Exploits Keep On Coming

    Sponsored by: enSilo

    Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition uncover the differences between design and security vulnerabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.