ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • 5 Things Better Connectivity Can Help You Achieve

    Sponsored by: Verizon

    By 2025, the average connected person will interact with a connected device nearly 4,800 times per day—about once every 18 seconds. If your organization’s network is not amply prepared, you will be at risk of falling behind.Access this infographic for 5 business advantages of increasing connectivity and how they impact your bottom line.

  • CW ANZ, July 2020: Expert Advice on Security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

  • Royal Holloway: Driverless vehicle security for military applications

    Sponsored by: ComputerWeekly.com

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment. This article examines how suitable these frameworks are for the military logistics AVs.

  • You've Got BEC!

    Sponsored by: Proofpoint

    BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.

  • Securing the New Normal: A Virtual Happy Hour on Moving Forward

    Sponsored by: RSA Conference

    In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.

  • Five Key Elements of Continuous IT Compliance

    Sponsored by: BMC

    As compliance regulations become more stringent, security and compliance teams are under additional pressure to ensure security, reduce risk and avoid conflicts. Download this white paper to learn more about a modern, intelligent approach to security – including 5 critical elements necessary for continuous IT compliance.

  • Driving Resiliency and Security in the Financial Services Industry

    Sponsored by: BMC

    Resiliency is critical to the long-term success of the financial services industry. This is due to the amount of sensitive personal and financial data they manage that have attracted increasingly sophisticated cyberattack methods. Read on to discover best practices for ensuring security and resiliency of t financial services organizations.

  • An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context

    Sponsored by: Delve

    To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.

  • Leveraging AI to Modernize Vulnerability Management and Remediation

    Sponsored by: Delve

    Advances in AI provide organizations with the ability to automate workloads and offer intelligent decision-making capabilities, easing the burden on IT and security teams and allowing them to focus on strategic imperatives. Download this white paper to learn more about embracing AI to modernize vulnerability management and remediation.

  • 10-Step Executive Action Plan for Collective Defense

    Sponsored by: IronNet

    A collective approach may be beneficial to organizations searching for security advantages.Indeed, a heightened security posture often begins and ends with collaboration. In this e-book, read more about how a combination of organizational preparedness and advanced technology can aid in defending against threats.

  • How to Get the Most Value out of Your Penetration Test

    Sponsored by: RSA Conference

    At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.

  • Prioritizing Network Vulnerabilities: A Survey and Comparison of Today’s Options

    Sponsored by: Delve

    In the current network security climate, there are three methods organizations can use to assess whether they are putting their eggs in the right baskets when it comes to vulnerability. Browse this white paper to get a closer look at these methods and see which can be best employed in your department.

  • 7 Ways AI Can Automate and Improve Vulnerability Management Operations

    Sponsored by: Delve

    Although under-utilized, AI has the potential to streamline operations through automation while reducing vulnerability risk for vulnerability management operations. Read this white paper to discover 7 ways AI can automate and enhance traditional or stagnant vulnerability management operations.

  • How Threat Modeling & Attack Simulation Works

    Sponsored by: Coalfire

    In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.

  • RSAC Resource Guide: U.S. Election Security 2020

    Sponsored by: RSA Conference

    Many cybersecurity experts have expressed concerns about the security of the upcoming U.S. elections. This RSAC Resource Guide: U.S. Election Security 2020 compiles expertise from industry leaders to provide readers with the insight and information they need to understand this topic.

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Sponsored by: ComputerWeekly.com

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

  • 5 Must-Haves for Your Next Enterprise Backup Solution

    Sponsored by: Cohesity

    Access this white paper to learn 5 must-haves when evaluating your next enterprise backup and recovery investment to overcome the operational challenges of disparate data and to simplify data management.

  • 5 Questions Every CIO Must Answer in the Coronavirus Age

    Sponsored by: Hitachi Vantara

    The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).

  • Cybersecurity Evolved: The Sophos Business Impact

    Sponsored by: Sophos

    Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.

  • The Rise of Enterprise Ransomware

    Sponsored by: Sophos

    Ransomware attacks have recently seen a pattern shift towards larger enterprises – but why? This white paper further examines the ransomware threat landscape, including key threats to keep an eye on and critical security technologies organizations should include to protect themselves.

  • Security Advisory: Is Your Enterprise Data Being "Phoned Home"?

    Sponsored by: ExtraHop

    Organizations give too little thought towards how their data is being used by the third-party vendors they partner with. Unfortunately, there are growing instances of data misuse. This white paper highlights 4 examples and shares best practices for ensuring data security, privacy and compliance.

  • Veracode Security Labs

    Sponsored by: Veracode, Inc.

    In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.

  • Business Continuity - What have we learned

    Sponsored by: Akamai Technologies

    The rapid changes of remote work have unfortunately expanded the attack surface and unforeseen complexity. To adapt to this new normal, organizations must move beyond inherent and static digital trust to adaptive access and threat protection. View this webinar to learn how to get started.

  • Using Risk Management strategies to help us effectively Socially Distance

    Sponsored by: Ostendio

    When it comes to COVID-19, risk cannot be eliminated, but it can certainly be minimized. This is the case for both managing organizational and personal risk. View this article from Ostendio to learn about steps your organization can take to help minimize and manage risk.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.