ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • How to Reach Cybersecurity Maturity in 5 Critical Steps

    Sponsored by: Dell SecureWorks

    Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.

  • The Business Case for Investing in a Security Ratings Platform

    Sponsored by: Security Scorecard

    Data breaches caused by third-party vendor relationships are on the rise. Unfortunately, most assessment techniques are point-in-time and only express a vendor's cyber health at a particular moment. In this white paper, learn how a security ratings platform can help companies to monitor changes in the health of their vendor ecosystems.

  • Market Guide for Data Masking

    Sponsored by: Micro Focus

    Security and risk management leaders should use data masking to desensitize or protect sensitive data. Privacy regulations, such as the GDPR, in particular, continue to drive strong interest in this technology market. In this white paper, discover key findings from Gartner's research and review recommendations for all organizations.

  • Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell EMC

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • Rethinking Data Security

    Sponsored by: Forcepoint

    The traditional network security perimeter has dissolved, primarily because of the rise of mobile employees and the adoption of cloud services. The result of this is overwhelmed security teams. In this white paper, learn how Forcepoint's Dynamic Data Protection helps organizations solve the fundamental challenges of traditional DLP deployments.

  • Endpoint Security: 7 Things you Should Pay Attention to Now

    Sponsored by: Freudenberg IT

    Outdated browsers, network protocol vulnerabilities, untrained users – these days, malware has lots of entry points. While hackers are becoming more professional, most companies are inadequately positioned when it comes to device security. In this white paper, learn 7 things you should pay attention to in order to secure your organization.

  • A Risk-Adaptive Approach to Dynamic Data Protection

    Sponsored by: Forcepoint

    Data protection can halt a security organization and productive work. Today, security teams are bogged down with alerts – but they don't have to be. Tune into this webinar to see how this data protection system uses human-centric behavior analytics to continuously determine the risk users pose, based on their actions.

  • Integrated Security Analytics

    Sponsored by: Forcepoint

    Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise makes the task of identifying genuine data theft risks challenging, even for well-resourced security operations teams. In this white paper, read about Forcepoint's integrated security analytics system.

  • How to Migrate the Insider Threat

    Sponsored by: Quest

    More and more IT pros are getting wise to the true nature of the insider threat. They understand that the insider threat is much more than a disgruntled admin sabotaging systems or stealing data. This white paper explains how organizations can up their game. It details 3 key best practices that will help you mitigate the insider threat.

  • Today's State of Vulnerability Response: Patch Work Demands Attention

    Sponsored by: ServiceNow

    As hackers ramp up their attacks and turn to advanced technologies such as artificial intelligence, it is essential that cybersecurity teams keep pace, fending off attacks and keeping sensitive data secure. In this research report, find a pragmatic roadmap for reducing data breaches.

  • Power of the Threat Detection Trinity

    Sponsored by: Micro Focus

    Today, SOCs face mounting challenges as the advanced threat landscape continues to evolve. Compounding the challenge of advanced threats is the explosion of data and lack of skilled security personnel. In this white paper, learn how you can best combine real-time correlation, insider threat analysis and hunting to protect against cyberthreats.

  • Threat Intelligence Executive Report

    Sponsored by: Dell SecureWorks

    In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.

  • Symantec Secures Rockwell Automation Industrial Control and Business Intelligence Solutions

    Sponsored by: Symantec

    Industrial control systems have become a major focus for attacks and are now among the top targeted sectors. To help address the risk to computer-based endpoints in automation systems, Rockwell Automation partnered with Symantec Corporation to provide endpoint level security. Download this case study to learn more about the partnership.

  • ACBA-Credit Agricole Bank Manages Ever Growing, Ever Changing Risks from the Threat Landscape

    Sponsored by: Symantec

    ACBA recognized a need to proactively protect its sensitive information across their technologies. In order to do this, they needed a centralized solution. In this case study, read about ACBA's experience deploying Symantec Endpoint Protection which they also integrated with Symantec Messaging Gateway and Symantec Loss Prevention.

  • How Tanium Addresses the NIST Cybersecurity Framework

    Sponsored by: Tanium

    Download this checklist to see how Tanium can help organizations meet the guidelines within the NIST Cybersecurity Framework.

  • Understanding the Contemporary Use of Vulnerability Disclosure in Consumer Internet of Things Product Companies

    Sponsored by: IoT Security Foundation

    Vulnerability disclosure is an important topic, especially for providers of IoT products and solutions. To avoid risk, when security issues are found, providers should set a process for responding to reports and managing the public disclosure. Download this report from the IoT Security Foundation to learn more about vulnerability disclosure.

  • Asset Management for Cybersecurity: 10 Essential Questions to Answer

    Sponsored by: Axonius

    When Axonius built their cybersecurity asset management platform, they had conversations with hundreds of security professionals about the challenges they face around seeing and securing all assets. In this post, they cover the 10 most common questions they heard, why they are difficult to answer, and how to overcome the obstacles.

  • Building a Business Case for Cybersecurity Asset Management

    Sponsored by: Axonius

    With many competing priorities facing information security teams, any new project must be prioritized against risk, net new capabilities, and ROI. Another challenge is the increasing number and types of devices on corporate networks. In this white paper, learn how to manage these challenges by using a cybersecurity asset management tool.

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: LogRhythm, Inc.

    Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution. This Gartner research report provides information about SIEM solutions and an analysis of vendors.

  • Assessing the Cyberthreat Landscape: Today's Reality, Tomorrow's Risks

    Sponsored by: Neustar

    The ever-changing cyberthreat landscape requires constant assessment. IT leaders must not only prioritize the many cyberthreats they face, but also use those insights to formulate and implement an appropriate mitigation strategy. Download this report sponsored by IDG to learn more about the cyberthreat landscape.

  • The Changing Face of Cyber Attacks

    Sponsored by: Neustar

    The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.

  • Customer Data Security & PCI Compliance Best Practices

    Sponsored by: Preferred Payments

    With the rise of database breaches and fraudulent credit card scams, new security requirements are becoming mandatory for SMBs. This checklist will help you understand what actions you need to take in order to avoid detrimental breaches and penalties. Inside, learn what to do to ensure your business has the best protection should a breach occur.

  • Monitor Electronic Communications

    Sponsored by: Micro Focus

    For organizations under regulatory authority, programs to monitor employee communications and behavior are the norm. However, deploying a program to perform automatic supervision monitoring and surveillance has its challenges. Download this white paper for the answers to these employee surveillance issues.

  • GDPR is Live, Now What

    Sponsored by: IBM

    The GDPR deadline of May 25th 2018 has passed so what can we expect to see now? In this webcast, experts John Bowman, Virginia Chinda and Jessica Douglas discuss how organizations can use GDPR as an opportunity to accelerate their analytics journey. They also discuss important GDPR topics and what to expect in the future.

  • SANS 2018 Threat Hunting Survey Results

    Sponsored by: DomainTools

    Threat hunting is a focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defender's networks. Threat hunting is a hypothesis-driven approach to validating the collection, detection and analysis of data ahead of an incident. In this white paper, learn about all things threat hunting.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.