ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • The Rise of Enterprise Ransomware

    Sponsored by: Sophos

    Ransomware attacks have recently seen a pattern shift towards larger enterprises – but why? This white paper further examines the ransomware threat landscape, including key threats to keep an eye on and critical security technologies organizations should include to protect themselves.

  • Veracode Security Labs

    Sponsored by: Veracode, Inc.

    In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.

  • Ensure Resilience for Business Operations

    Sponsored by: ServiceNow

    As your business grapples with disruption and uncertainty, ServiceNow can help. Digital workflows and a “platform of platforms” approach can make it easier to work through a crisis, build resilience, and enable digital transformation initiatives that may be pivotal to recovery and growth in this new normal. Review this data sheet to learn more.

  • Business Continuity - What have we learned

    Sponsored by: Akamai Technologies

    The rapid changes of remote work have unfortunately expanded the attack surface and unforeseen complexity. To adapt to this new normal, organizations must move beyond inherent and static digital trust to adaptive access and threat protection. View this webinar to learn how to get started.

  • Using Risk Management strategies to help us effectively Socially Distance

    Sponsored by: Ostendio

    When it comes to COVID-19, risk cannot be eliminated, but it can certainly be minimized. This is the case for both managing organizational and personal risk. View this article from Ostendio to learn about steps your organization can take to help minimize and manage risk.

  • Top 10 Considerations for GRC Software Tools

    Sponsored by: Ostendio

    The GRC tool selection process is often flooded with an overwhelming amount of choices, made more difficult by confusing terminology and varied opinions. This article helps to break down the problem by providing a brief overview on why and how companies are using GRC as well as 10 questions to consider during the evaluating process.

  • How Can A Risk Management Platform Support Your Business During A Crisis?

    Sponsored by: Ostendio

    While organizations may be anxious to return to work, it’s critical to keep in mind the lessons learnt about maintaining security and productivity during a crisis. Developing a solid crisis management plan can help with responding to future incidents. Read this article to uncover 6 key steps to help you get started.

  • How to Choose a SOC 2 Auditor: 6 Questions to Ask

    Sponsored by: Ostendio

    For organizations looking to conduct a SOC 2 audit, choosing the right external audit firm can be a daunting, yet crucial, process. To make sure you choose the right partner, this article highlights 6 questions to consider during the selection process. Read on to find out what they are.

  • False cents of security: The price of being compromised

    Sponsored by: ComputerWeekly.com

    Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.

  • Addressing Digital Risks in Business-Critical Infrastructures

    Sponsored by: Schneider Electric

    In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.

  • COVID-19: Keeping Your Vulnerability Management Program on Track

    Sponsored by: Vulcan

    As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.

  • All Good Remediation Strategies Begin with Collaboration

    Sponsored by: Vulcan

    As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.

  • Runtime Memory Analysis: A Better Way Forward for Vulnerability Management

    Sponsored by: Rezilion

    According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.

  • The Problem with CVSS Scores & What It Means for Vulnerability Management

    Sponsored by: Vulcan

    While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.

  • Your Guide to Mastering Vulnerability Remediation

    Sponsored by: Vulcan

    In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.

  • Vulnerability Remediation in Three Steps

    Sponsored by: Vulcan

    As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.

  • Vulnerability Management 2020 Navigating to New Heights

    Sponsored by: Vulcan

    Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.

  • Your Vulnerability Management Process Isn't Working

    Sponsored by: Vulcan

    When it comes to vulnerability discover and remediation, it’s easy to get caught up in the details. Every now and then it’s important for CISOs to take a step back and make sure you’re not missing the security forest for the vulnerability trees. This article focuses on three common, but costly, mistakes that IT and security leaders should avoid.

  • Vulnerability Metrics - Which Matter and Which Don't

    Sponsored by: Vulcan

    Metrics enable organizations to share information about cybersecurity risks and demonstrate vulnerabilities – but only if they’re the right metrics. So, how can you delineate between metrics of significance and those that can be ignored? Read on to find out.

  • Cognitions of a Cybercriminal

    Sponsored by: VMware International Unlimited Company

    Cybercriminals grow increasingly creative each year, finding new ways to bypass security methods without detection. This white paper is designed to help CISOs in their pursuit of cybercriminals by offering an inside look into the mindset of their behavior and breaking down their attack patterns. Access now to reserve your copy.

  • HOW TO COMBAT Ransomware

    Sponsored by: VMware International Unlimited Company

    Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.

  • Automating Your Vulnerability Remediation Process

    Sponsored by: Vulcan

    The vulnerability management lifecycle is a time-consuming set of tasks, making it a perfect candidate for integrating automation into the process. But how should organizations go about this? This white paper provides a set of examples and uses cases for what to do. Read on to get started.

  • Justify Your Vulnerability Management Program

    Sponsored by: Vulcan

    In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.

  • The Top 5 Mistakes That Everyone in Vulnerability Remediation is Making

    Sponsored by: Vulcan

    Cyberattackers are growing cleverer with each passing year, exposing new vulnerabilities and exploiting old ones to cause costly and disruptive breaches. Its time for organizations to fight back. In this white paper take a closer look at the top five most common mistakes in vulnerability management and how to avoid them.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell Technologies

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.