ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Robotic Process Automation (RPA): Solving Key Security Challenges in RPA Deployments

    Sponsored by: Cyber-Ark Software

    Robotic process automation (RPA) has the potential to deliver huge benefits to organizations; however, it is easy to overlook the IT security risks that RPA deployment can bring. In this white paper, learn how to mitigate those IT security risks. Also, explore typical approaches to RPA deployment and the benefits it offers.

  • Planning for Office 365 Gaps

    Sponsored by: Mimecast

    Although Office 365 is widely used, easy to use and has built in security features, it has resilient gaps in terms of security, data retention and email continuity. In this white paper, learn how to protect your organization by implementing a cyber-resilience strategy for Office 365.

  • Best Practices for GDPR and CCPA Compliance

    Sponsored by: Micro Focus

    The regulatory climate around the world for data protection is heating up, with GDPR leading the way and other regional areas starting to enact their own frameworks. In this research report, explore key findings from an in-depth survey of North American organizations with regard to their plans for GDPR and CCPA compliance.

  • Infographic: 2019 IT Priorities - Middle East

    Sponsored by: ComputerWeekly.com

    In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.

  • Best Practices for Stopping Risk in its Tracks

    Sponsored by: Smarsh

    How can firms improve their supervision workflows to better reveal risk? In this guide, examine some strategies for staying on top of the rapidly evolving communications landscape, and the new vectors for risk it offers.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • Zero Trust Security: Supporting a CARTA approach with Network Security

    Sponsored by: Tigera

    In this webinar, discover how Christopher Liljenstolpe is using a continuous adaptive risk and trust assessment (CARTA) approach with network security.

  • Reduce the Risk of Phishing Attacks on Your Company

    Sponsored by: Inky Technology

    Every employee with an email address within your organization is a risk to your business. How those employees react to a phishing attempt can be critical to the success or destruction of your business. In this blog, learn how INKY Phish Fence can help reduce the risk of phishing attacks on your company.

  • How to Prevent Data Breaches

    Sponsored by: SkOUT

    How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.

  • Testing for Compliance Just Became Easier

    Sponsored by: Cymulate

    Compliance regulations originated as efforts to ensure data security, but they have morphed into overwhelming challenges for IT and security teams. In this white paper, learn how Cymulate's Breach and Attack Simulation can ensure your organization is audit-ready while also measuring the level of risk across your threat vectors and infrastructure.

  • 5 Ways to Reduce Risk and Boost Productivity

    Sponsored by: Citrix

    While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.

  • Anybody Home? Vulnerability Scans vs. Penetration Tests

    Sponsored by: SkOUT

    This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.

  • Real-Time Anomaly Detection at Scale: 19 Billion Events per Day

    Sponsored by: Instaclustr

    Read this white paper to learn how to utilize open source software and the cloud to enable scalable anomaly detection in your organization with the capability to process 19 billion events in a single day.

  • Industry Cyber-Exposure Report

    Sponsored by: Rapid7

    Rapid7's recently conducted a cybersecurity test to measure exposure and resiliency in the United Kingdom. They measured the Internet-facing security profiles of the FTSE 2501 plus a handful of non-FTSE 250 members. Explore the results in this report.

  • Security Awareness Training Done Right

    Sponsored by: Mimecast

    Despite the most advanced protections that can be put in place, despite the best threat intelligence that can be brought, organizations remain vulnerable to attacks because of one key factor: human error. In this solution brief, learn how Mimecast Awareness Training can help organizations combat security breaches caused by employee mistakes.

  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse in Salesforce

    Sponsored by: FairWarning

    Privileged Salesforce users are necessary to every organization however, with the ability to make nearly unlimited changes; they place your organization at tremendous risk. In this white paper, explore 4 best practices for preventing privileged user abuse in Salesforce.

  • What Is Phishing and What Are Top CISOs Doing About It?

    Sponsored by: Inky Technology

    In the last year, different types of phishing attacks have begun to emerge. One example is a wire transfer scam in which attackers steal money from companies after suggesting an overdue bill or unpaid invoice. Download this blog to explore different types of phishing attacks and see what businesses can do to prevent them.

  • Protecting the End User

    Sponsored by: Proofpoint

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organizations can take to build a people-centric defense.

  • CyberArk PAS Assessment Tool

    Sponsored by: CyberArk Software, Inc

    The commonality in most data breaches and cyberattacks is the exploitation of privileged accounts, credentials and access keys. In this solution brief, learn how CyberArk's Privileged Access Security Assessment Tool can help you evaluate your current privileged access security risk and vulnerabilities.

  • Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance

    Sponsored by: HackerOne

    Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.

  • The Zenefits Bug Bounty Story

    Sponsored by: HackerOne

    Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.

  • Salesforce Uses Bug Bounties to Protect Customer Data

    Sponsored by: HackerOne

    Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.

  • The Total Economic Impact Of Alert Logic SIEMless Threat Management

    Sponsored by: Alert Logic

    Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.

  • Enterprise Collaboration: Benefits, Misalignment's, and Risks

    Sponsored by: Adobe Systems Incorporated

    In this white paper, learn how to address common enterprise collaboration and digital transformation challenges by addressing corresponding data privacy, data security, and regulatory compliance obstacles. Additionally discover how collaboration initiatives can help your organization accelerate decision-making, increase productivity, and more.

  • The Practical Executive's Guide to Data Loss Prevention

    Sponsored by: Forcepoint

    There has been much confusion in the marketplace regarding data loss prevention (DLP) controls. As a result, organizations that want to protect their confidential data and comply with laws and regulations are often unsure where to turn. In this white paper, explore a 9-step process for implementing and executing a data protection strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.