ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Understanding Security Ratings

    Sponsored by: Security Scorecard

    Security ratings grade your organization on how well it protects information. In a digital world, the importance of data and your company's protection of that data parallels your income and protection of financial assets. In this white paper, learn all things security ratings including what they are and why they are useful.

  • The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018

    Sponsored by: Security Scorecard

    According to Forrester's survey, only 14% of respondents are confident that they effectively track all of their third parties. Cybersecurity risk rating solutions can help by automating the collection and analysis of third-party risk data. In this report, Forrester identifies the 9 most significant cybersecurity risk rating solution providers.

  • 2018 Incident Response Insights Report

    Sponsored by: Dell SecureWorks

    In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.

  • Security Maturity: Mapping the Road to Resilience

    Sponsored by: Dell SecureWorks

    Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell EMC

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • The Complete Guide to Building Your Vendor Risk Management Program

    Sponsored by: Security Scorecard

    Tackling the problem of vendor risk isn't made any easier by the fact that with technology solutions being added by the day, current vendor risk management (VRM) processes are not equipped to handle the growing demand of security risk assessments for new and existing third-parties. In this guide, learn how to improve your VRM program.

  • How Security Ratings Improve Risk Awareness While Delivering a Solid ROI

    Sponsored by: Security Scorecard

    Combatting cybersecurity risk is a difficult challenge. Without visibility into internal and external risk, this battle becomes even harder. In this white paper, learn how security ratings offer critical insight into vulnerabilities presented both in your environment and the environment of third-parties.

  • How to Reach Cybersecurity Maturity in 5 Critical Steps

    Sponsored by: Dell SecureWorks

    Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.

  • The Business Case for Investing in a Security Ratings Platform

    Sponsored by: Security Scorecard

    Data breaches caused by third-party vendor relationships are on the rise. Unfortunately, most assessment techniques are point-in-time and only express a vendor's cyber health at a particular moment. In this white paper, learn how a security ratings platform can help companies to monitor changes in the health of their vendor ecosystems.

  • Market Guide for Data Masking

    Sponsored by: Micro Focus

    Security and risk management leaders should use data masking to desensitize or protect sensitive data. Privacy regulations, such as the GDPR, in particular, continue to drive strong interest in this technology market. In this white paper, discover key findings from Gartner's research and review recommendations for all organizations.

  • Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell EMC

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • Today's State of Vulnerability Response: Patch Work Demands Attention

    Sponsored by: ServiceNow

    As hackers ramp up their attacks and turn to advanced technologies such as artificial intelligence, it is essential that cybersecurity teams keep pace, fending off attacks and keeping sensitive data secure. In this research report, find a pragmatic roadmap for reducing data breaches.

  • Power of the Threat Detection Trinity

    Sponsored by: Micro Focus

    Today, SOCs face mounting challenges as the advanced threat landscape continues to evolve. Compounding the challenge of advanced threats is the explosion of data and lack of skilled security personnel. In this white paper, learn how you can best combine real-time correlation, insider threat analysis and hunting to protect against cyberthreats.

  • Threat Intelligence Executive Report

    Sponsored by: Dell SecureWorks

    In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.

  • How Tanium Addresses the NIST Cybersecurity Framework

    Sponsored by: Tanium

    Download this checklist to see how Tanium can help organizations meet the guidelines within the NIST Cybersecurity Framework.

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: LogRhythm, Inc.

    Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution. This Gartner research report provides information about SIEM solutions and an analysis of vendors.

  • Assessing the Cyberthreat Landscape: Today's Reality, Tomorrow's Risks

    Sponsored by: Neustar

    The ever-changing cyberthreat landscape requires constant assessment. IT leaders must not only prioritize the many cyberthreats they face, but also use those insights to formulate and implement an appropriate mitigation strategy. Download this report sponsored by IDG to learn more about the cyberthreat landscape.

  • The Changing Face of Cyber Attacks

    Sponsored by: Neustar

    The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.

  • SANS 2018 Threat Hunting Survey Results

    Sponsored by: DomainTools

    Threat hunting is a focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defender's networks. Threat hunting is a hypothesis-driven approach to validating the collection, detection and analysis of data ahead of an incident. In this white paper, learn about all things threat hunting.

  • 2019: No Oscars for Bad Threat Actors

    Sponsored by: DomainTools

    There has been a massive increase in the number and types of cybersecurity threats over the years. In this webcast, experts from DomainTools discuss some cyber forecasts and predictions for the coming years including IoT devices, automation, breaches and more.

  • The Beginner's Guide to Mitigating Phishing Attacks

    Sponsored by: DomainTools

    Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.

  • Reduce Risks and Increase Donor Trust with Better Nonprofit Compliance

    Sponsored by: Cornerstone OnDemand

    Meeting business, HR, and data regulations is a fact of life for every organization, yet not every organization has the same resources to invest in or manage compliance efficiently. Download this white paper to learn why ensuring compliance is not only crucial to a nonprofits ability to fulfill its mission, but necessary in sustaining it.

  • Closing the IT Security Gap with Automation & AI in the Era of IoT: EMEA

    Sponsored by: Aruba Networks

    The purpose of this research by Ponemon Institute is to understand the gaps in IT security programs and strategies that diminish companies' ability to identify, detect, contain and resolve data breaches and other security incidents. In this report, Ponemon Institute presents the findings from a survey completed by IT and IT security practitioners.

  • Security Orchestration, Automation and Response (SOAR) Buyer's Guide

    Sponsored by: Swimlane

    In today's complex computing environments, it can be hard to determine what actual security coverage is in place. Finding skilled security analysts is an increasingly difficult task. Each year as threats grow, CISOs must do more with less. A SOAR solution can help simplify, automate and document the incident response process.

  • Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value

    Sponsored by: Arctic Wolf

    In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.