ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Audits Research

  • Protect Your Network: Best Practices, Incidents & Other Security Considerations

    Sponsored by: Zones, Inc.

    Machine learning and automation have advanced security response methods. However, hackers are equally adept at bypassing even the most sophisticated security measures. So, how can organizations address these challenges? Download this e-guide to discover network security best practices, incidents and other security considerations.

  • MSPs: The 5 Essentials from Your Endpoint Security Partner

    Sponsored by: Malwarebytes

    When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.

  • Privacy Essentials for Security Professionals

    Sponsored by: BigID

    Today’s security professionals face growing pressure – both internally (cybersecurity initiatives) and externally (CCPA, GDPR & other data privacy regulations). This data sheet outlines key consideration areas to help organizations meet compliance requirements and ensure data protection across their environment.

  • Discovery-In-Depth: The Path to Data Intelligence

    Sponsored by: BigID

    Data discover is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.

  • Birst Security and Reliability

    Sponsored by: Infor

    The following white paper provides an in-depth look at the key security capabilities of Birst, an Infor company. Download this white paper to learn how Birst ensure the protection and privacy of their customers data and discover how they maintain high data security standards.

  • Enhancing Security Automation

    Sponsored by: TITUS

    Download the following solution overview to discover how Titus’s security automation tools are equipping enterprises with the confidence to make accurate and effective data security decisions, bring context to cloud security policies, and more.

  • Data Security: Best Practices for Remote Workers

    Sponsored by: TITUS

    How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.

  • MITRE ATT&CK Evaluations — APT29

    Sponsored by: Trend Micro

    In addition to their framework enabling organizations to learn about common cyberattacks, MITRE ATT&CK also offers an evaluation service in which they assess an organization’s security posture against simulated versions of known attacks. Download this white paper for an in-depth look at Trend Micro’s evaluation results.

  • How the Cognito platform enables organizations to detect intrusions

    Sponsored by: Vectra AI

    Security analytics and SIEM are modern approaches to security designed to help organizations better understand their environments and the threats they face. This EMA Top 3 report highlights a variety of use cases designed to inform decision makers in their project planning and decision-making process.

  • How to Choose a SOC 2 Auditor: 6 Questions to Ask

    Sponsored by: Ostendio

    For organizations looking to conduct a SOC 2 audit, choosing the right external audit firm can be a daunting, yet crucial, process. To make sure you choose the right partner, this article highlights 6 questions to consider during the selection process. Read on to find out what they are.

  • Executive Brief: The Dark Side of Encryption

    Sponsored by: SonicWall

    Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.

  • Cyber Hygiene: If Tools Could Talk

    Sponsored by: Merlin International

    The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.

  • Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs

    Sponsored by: Dell SecureWorks

    The MITRE ATT&CK framework provides globally accessible information regarding adversary tactics and techniques based on observations. To further help end-users, MITRE uses the ATT&CK framework to evaluate various offerings and vendors. Watch this webinar to learn more about the evaluations and how to use them to address your security needs.

  • Top 10 Security Events to Monitor in Azure Ad and Microsoft 365

    Sponsored by: Quest

    Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.

  • COVID-19: Keeping Your Vulnerability Management Program on Track

    Sponsored by: Vulcan

    As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.

  • Essential Elements of a Penetration Test

    Sponsored by: Synack

    A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.

  • Hack the Pentagon Case Study

    Sponsored by: Synack

    The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.

  • The Synack Value

    Sponsored by: Synack

    As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.

  • The Problem with CVSS Scores & What It Means for Vulnerability Management

    Sponsored by: Vulcan

    While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.

  • Rain Financial Case Study

    Sponsored by: Synack

    In this case study, follow Rain Financial, a digital currency exchange partner in the Middle East, as they embark on a journey to identify, remediate and proactively protect against vulnerabilities that threaten the security of their customers’ data.

  • Crowdsourced Security Testing Overview

    Sponsored by: Synack

    Crowdsourced penetration testing has shown to provide organizations with in-depth, actionable insights. However, scaling that crowd requires machine intelligence. In this solution brief, take a closer look at Synack’s Crowdsourced Security Testing, designed to combine artificial and human intelligence into one penetration testing platform.

  • Advantages of Using A Hosted Payment Page

    Sponsored by: SFG

    For organizations interested in selling their products or services online, establishing payment processing and ensuring PCI compliance can be an enormous barrier to entry. To ease the workload, organizations are turning to hosted payment pages. This whitepaper explores how hosted pages work and highlights their key benefits.

  • A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology

    Sponsored by: DivvyCloud

    Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.

  • End-to-End Security Solutions for Mid-Market Businesses

    Sponsored by: Dell Technologies and Intel

    Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.

  • GDPR Compliance support that works for your business

    Sponsored by: TITUS

    GDPR is forcing organizations to rethink their workflows and achieve broader visibility into personal data collection. In this solution brief, take a closer look at Titus’ offering that is powered by machine learning to help identify what data you have, how sensitive it is, and how it should be handled by your security stack.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.