ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • On-Prem SCCM Patch Management Solution - What is The True Cost Burden?

    Sponsored by: Automox

    Organizations looking into purchasing new software or solutions typically focus on the list price of the license and fail to consider the hidden maintenance costs associated. This article dissects Microsoft’s on-prem SCCM patch management solution to reveal its total cost of ownership by uncovering hidden costs.

  • Cortex XDR: Breaking the Security Silos for Detection and Response

    Sponsored by: Palo Alto Networks

    Although dealing with threats and vulnerabilities is stressful, managing the repetitive tasks associated with incident detection and response is arguably an equally frustrating responsibility. This white paper highlights the key capabilities of Cortex XDR, designed to alleviate this process by automating certain tasks. Read on to learn more.

  • Microsoft Defender Advanced Threat Protection and Skybox Security

    Sponsored by: Skybox Security

    In this short video, explore an overview of how Skybox leverages Microsoft Defender ATP to enhance vulnerability management, improve threat discovery and prioritize risk. Read on to learn more about the benefits of this integration.

  • An Anchor of Trust in a Digital World: Risk Management Strategies for Digital Processes

    Sponsored by: Thales

    A growing number of entities have integrated Hardware Security Modules (HSMs) into their information risk management deployments. In this white paper, learn about hardware security modules and the attributes that position HSMs as an attractive component in information risk management.

  • Smart Automation for Security Policy Management

    Sponsored by: Skybox Security

    Gartner predicts that by the end of 2020 as many as 99% of firewall breaches will be a result of misconfigurations rather than software issues. To address misconfigurations, security teams are turning to analytics-driven automation tools. Read on to learn more about their capabilities & how they can help meet your security needs.

  • COVID-19 App Supplier Risk

    Sponsored by: Syniti

    Watch this brief video to learn how you can use Syniti’s app to track and manage your supplier risk in times of uncertainty.

  • Skybox Security Overview

    Sponsored by: Skybox Security

    This short video highlights the key capabilities of the Skybox Security Suite, which offers functionalities that range from vulnerability and threat management to firewall and security policy management. Learn more about the suite now, and see if it’s a good fit for your needs.

  • Risk-Based Vulnerability Management

    Sponsored by: Skybox Security

    Traditional vulnerability management was a bit like whack-a-mole: It relied on actively monitoring an environment for threats, then moving in to patch them as soon as they popped up. But what if you had the context to know where the ‘moles’ were most like pop up, and when? Read on to learn about this unique approach.

  • CCPA legislation overview: Everything you need to know to prepare

    Sponsored by: TechTarget

    The deadline for CCPA is rapidly approaching. With just a few months left to finalize your consumer data protection strategy, it's critical to take a step back and ensure your approach doesn't have any gaps. Our CCPA guidebook equips you with knowledge to better understand the legislation. Complete our survey to reserve your free copy.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • HTTP Security Headers Guidelines: An Informative Tutorial

    Sponsored by: TechTarget

    In our exclusive expert guide, Who, What & How of HTTP Security Headers, Judith Myerson outlines how to defend your websites using strong HTTP security headers. To claim your free PDF download, participate in our market research program.

  • Five Stages to Create A Closed-Loop Security Process with MITRE ATT&CK

    Sponsored by: Cybereason

    Prior to MITRE ATT&CK, a security framework that allowed for realistic testing and provided a basis for improvement of security operations process and technology didn’t fully exist. In this white paper, discover the key components of the MITRE ATT&CK framework and 5 stages for creating a closed-loop security process.

  • Lessons and Best Practices from CIO's Experience

    Sponsored by: BlackBerry

    "IT and cyber operations needed to leverage all possible organizational communications modes to get the word out to the entire enterprise to ignore the incoming email and delete it, direct specific action potentially warn our partners about the situation.

  • Hazard Identification, Planning, and Analysis as the Foundation for Effective Crisis Management

    Sponsored by: BlackBerry

    Threat hazard identification and risk assement begins with an in-depth exploration of the threats an organization might face. Understanding this risk environment is essential forbuilding a practical, affordable, and effective risk mitigation plan. Take our brief survey and gain access to our guide for senior leaders.

  • Pros and Cons of Patching With WSUS

    Sponsored by: Automox

    Windows Server Update Services (WSUS) is a widely used patch management tool designed to address challenges related to manual patching. However, there are scalability and usability issues when it comes to using WSUS. This article highlights the pros & cons of using WSUS, read on to see what they are.

  • Manage Windows Updates Without WSUS

    Sponsored by: Automox

    Regular patch management is often recognized as a cybersecurity best practice. However, for today’s Windows users, overly complex patching solutions make regular patching unmanageable. In this article, explore the limitations of WSUS, patch management best practices, and discover why you should consider automated patch management.

  • Help Reduce Cyber Risks and Simplify Your Journey to Compliance

    Sponsored by: AT&T Cybersecurity

    For organizations with a limited IT budget, gaining the visibility needed to understand security risks and address compliance requirements is a cumbersome task. In this solution brief, explore the features and capabilities of AT&T Cybersecurity – designed to simplify compliance and security – to see if it’s a good fit for your needs.

  • CCPA legislation overview: Everything you need to know to prepare

    Sponsored by: TechTarget

    The deadline for CCPA is rapidly approaching. With just a few months left to finalize your consumer data protection strategy, it's critical to take a step back and ensure your approach doesn't have any gaps. Our CCPA guidebook equips you with knowledge to better understand the legislation. Complete our survey to reserve your free copy.

  • Rapid Response: 3 Immediate Actions You Can Take to Mitigate Supply Risks and Disruptions

    Sponsored by: GEP

    Disruptions to supply chains—like the current COVID-19 crisis and previous recessions—are not new, and yet, it can feel impossible to be fully prepared. Download this white paper to explore 3 actions you can take right now to help mitigate supply risks and disruptions.

  • COVID-19 in APAC:Tech industry lessons & innovations

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.

  • Guide to business continuity planning: COVID-19 and beyond

    Sponsored by: ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • InfoSec Risk Management in Healthcare Environments a Primer to Assessing Technical Risk

    Sponsored by: CI Security

    In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.

  • IT Priorities 2020: APAC

    Sponsored by: ComputerWeekly.com

    The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • 5 Data Security Challenges to Modern Collaboration

    Sponsored by: Nucleus Cyber

    With the increase in team collaboration adoption outside of fixed office locations, it’s never been more important to ensure data security. In this white paper, discover the underlying factors driving how people now use and share information and the impact that has had on how organizations need to protect their sensitive data.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.