Research Library

Powered by

Risk Management Research

  • Does the GDPR Apply to You?

    Sponsored by: Imperva

    Organizations which are not in compliance with the GDPR can expect very stiff financial penalties. This resource offers insight into which organizations the GDPR applies, key data security requirements of the regulation, non-compliance penalties and more.

  • GDPR: The Penalties for Non-Compliance

    Sponsored by: Imperva

    The GDPR gives data protection authorities more investigative and enforcement powers. This resource reveals the harsh penalties of not complying with the GDPR.

  • Integrating Human and Technological Elements in your Security Strategy

    Sponsored by: Kaspersky Lab

    Cybercrime damages are expected to cost the world $6 trillion by 2021, according to CSO. This resource offers strategies for protecting your business from the ever-changing threat landscape.

  • The Mystery of the APT

    Sponsored by: Kaspersky Lab

    For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.

  • 5 Ways Modern Malware Defeats Your Defenses

    Sponsored by: Radware

    According to the Verizon DBIR, 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. This resource reveals 5 common evasion techniques used by modern malware and how they conquer anti-malware defenses.

  • Get Going with your GDPR Plan

    Sponsored by: Imperva

    How is your organization preparing for GDPR's May 2018 deadline? Take a look at this infographic to uncover a step-by-step plan for complying with the GDPR.

  • A Quick History of IoT Botnets

    Sponsored by: Radware

    Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.

  • Evolving Threat of Botnets, Web Scraping and IoT Zombies

    Sponsored by: Radware

    By 2020, the number of IoT units installed could reach as many as 20 billion, according to Gartner. This resource examines the severity of dangerous bots, which exploit IoT devices as weapons of attack.

  • Deception Matters: Slowing Down the Adversary

    Sponsored by: Illusive Networks

    In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.

  • Reducing Cybersecurity Costs & Risk through Automation Technologies

    Sponsored by: Juniper Networks

    This infographic summarizes key findings of the 2017 Ponemon Juniper Report detailing why automation technologies are joining forces with current security strategies.

  • Cloud Security: Making Sense of the Shared Responsibility Model

    Sponsored by: Oracle Corporation

    For enterprises using cloud services, there's a lot of confusion surrounding the shared responsibility model, particularly with what security measures the enterprise must provide. This resource explores the root cause behind this confusion and offers examples of how enterprises are successfully addressing and embracing the model.

  • Web Application Security in a Digitally Connected World

    Sponsored by: Radware

    According to a recent Ponemon Institute study, 68% of organizations admit low confidence in their information security posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.

  • The Future of Privileged Management

    Sponsored by: One Identity

    The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts.

  • Cyber Threats: Is Your Team Up to the Challenge?

    Sponsored by: Juniper Networks

    In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.

  • IoT and the New Security Challenge

    Sponsored by: Juniper Networks

    According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.

  • Regulating Privileged Access: When to Require Human Approval Workflows

    Sponsored by: One Identity

    Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity.

  • Mitigate the top nine cloud threats with a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).

  • Making the case for a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.

  • Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

    Sponsored by: One Identity

    In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights.

  • Identity Analytics – A more Collective Defense

    Sponsored by: One Identity

    As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task.

  • The 12 Essential Tasks of Active Directory Domain Services

    Sponsored by: One Identity

    This resource outlines the 12 essential tasks of Active Directory (AD) Domain Services and how utilizing AD can help improve your security needs.

  • Active Directory Management and Security

    Sponsored by: One Identity

    Many organizations expect powerful access controls from their networking operating systems. This resource offers optimized Windows security by implementing an effective IAM approach, including, access control, password management and more.

  • Employee & Device Monitoring: Dispelling the Myths

    Sponsored by: Forcepoint

    Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program.

  • Threat Intelligence: Cybersecurity's Best Kept Secret

    Sponsored by: CrowdStrike

    Since threat intelligence comes in many shapes and forms, misunderstandings about what cyber threat intelligence (CTI) entails is common. This resource offers 4 use cases on CTI and explains different categories of CTI and how it can be optimized within security teams.

  • Easily Extend Data Loss Prevention to the Cloud

    Sponsored by: Symantec

    To avoid regulation penalties, companies need to know where sensitive and personal data resides. This resource offers a strategy for protecting sensitive data in many areas, including the cloud, endpoints, servers, network and email.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.