Research Library

Powered by

Security Research

  • Utility Regulations Demand Robust Third-Party Risk Management

    Sponsored by: BitSight

    In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.

  • The Challenges & Urgency of Managing Third-Party Risk

    Sponsored by: BitSight

    Managing cyberthreats is becoming more challenging and urgent as businesses expand their ecosystems through their reliance on third parties. As a result, cyberthreats are top concerns for modern organizations worldwide. In this white paper, learn how organizations can better manage their third-party risk.

  • An Expanding Attack Surface: 5 Tips to Manage Third-Party Risk

    Sponsored by: BitSight

    In this e-book, learn 5 actionable steps to help you establish an effective third-party risk management program.

  • Intelligent Identity And Access Management

    Sponsored by: HelpSystems

    Providing Identity and Access Management (IAM) is a huge task; therefore, organizations are likely to face many challenges. Unfortunately, the environments that IAM systems support are often subject to attacks. In this white paper, learn how to leverage Intelligent IAM to help keep your organization's identity and accounts safe and secure.

  • What's Your Digital Maturity?: How to Tell if Your Business is Digital Ready

    Sponsored by: Equinix

    In this Equinix blog post, discover how to tell if your business is digital ready.

  • Personnel Administration and Security Solution for Federal Agencies

    Sponsored by: Appian

    In this white paper, learn how the Appian Personnel Administration and Security Solution (PASS) can help create a unified view of people and investigations in order to improve the efficiency and effectiveness of personnel security administration.

  • 5 Advantages of Featuring Alibaba Cloud In Your Multicloud Strategy

    Sponsored by: Alibaba Cloud

    View this white paper to learn why more and more organizations are shifting to a multi-cloud strategy. Discover the secret to multi-cloud success, and learn how Alibaba Cloud can help your organization maximize your multic-cloud potential.

  • Steps to Prepare for California's New Consumer Privacy Act of 2018

    Sponsored by: Immuta, Inc

    The California Consumer Privacy Act of 2018 (CCPA) is taking effect on January 1, 2020. While organizations can build on their GDPR efforts to be in accordance with new CCPA rules, meeting GDPR laws by itself does not mean an organization meets CCPA rules. Download this guide to make sure your organization is ready for the upcoming deadline.

  • 2019 Special Phishing Report

    Sponsored by: Inky Technology

    Just a single phishing attack can cost an organization hundreds of thousands, if not millions, of dollars. In this 2019 Special Phishing Report, discover how many phishing emails still breach the leading email protection systems, and why identifying and blocking these attacks still poses such a challenge.

  • Tackling the Visibility Gap in Information Security

    Sponsored by: ReliaQuest

    Read on to uncover the most tangible pain points in security management and the emerging mandate required from people, processes and technology to continue optimizing threat protection.

  • Achieving Secure Authentication and Zero-Trust Security Without Agents or Proxies

    Sponsored by: Silverfort

    Silverfort can enable organizations to enforce secure authentication – including MFA, adaptive authentication and zero trust – without deploying software agents or proxies. Tune into this webinar to learn more.

  • The Risk Initiative: Building a Business Case with Mitigation ROI

    Sponsored by: Cyber-Ark Software

    CyberArk launched a multi-part research project "The Risk Initiative: Building a Business Case with Mitigation ROI" which is designed to investigate how cybersecurity professionals can mature their programs to move towards ROI-centric decision-making. Download this research report to explore key findings.

  • How to Design and Implement a GRC Framework for Enterprise Data Analytics

    Sponsored by: Immuta, Inc

    In this e-book, discover the organizational factors which must be considered in designing and implementing data policies and access control for analytic initiatives within an enterprise.

  • Cybersecurity Trailblazers Make Security Intrinsic to Their Business

    Sponsored by: VMware

    In this e-book, find suggestions for improving your enterprises' security posture, based on lessons learned from the cybersecurity trailblazers and executives interviewed for this report.

  • Data Protection by Design

    Sponsored by: Immuta, Inc

    Data Protection by Design (DPbD) is the core data protection requirement introduced by the GDPR. And yet despite DPbD's centrality to the GDPR, it receives scant attention. Why? It's quite difficult to implement because it consists of many different requirements. In this white paper, explore what the DPbD is and why it's central to the GDPR.

  • 5 Approaches to a Consistently Evolving Cybersecurity Program

    Sponsored by: ReliaQuest

    When executed correctly, a consistently evolving security program can help manage costs and drive value beyond cybersecurity by delivering key strategic data analysis and insights to other departments. Read on to learn 5 approaches to a consistently evolving cybersecurity program

  • Top 5 Log Sources You Should be Ingesting but Probably Aren't

    Sponsored by: ReliaQuest

    Logging and monitoring all relevant events from across the IT environment has ups and downs. Download this white paper for logging tips that can help save money and enhance security at your organization.

  • Preparing for Personal Data Privacy Policies

    Sponsored by: Micro Focus

    As data privacy laws continue to be established, the relationship that individuals have with companies has changed. No longer are companies free to just collect data and do whatever they please; they now effectively become stewards of the data. In this e-guide, discover how organizations can better manage personal data.

  • Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

    Sponsored by: LexisNexis Risk Solutions

    In this eBook, discover the top 10 anti-fraud tips on how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.

  • Information Security Program Health Monitoring Guide

    Sponsored by: ReliaQuest

    Health monitoring is an often-overlooked process that's critical to maintaining a secure environment. Learn how to address existing vulnerabilities, implement best practices and assess tool efficacy to protect your enterprise.

  • Securing DevOps Environments in the Enterprise

    Sponsored by: Cyber-Ark Software

    Download this white paper to learn about the importance of protecting the DevOps pipeline, common use cases, and essential principles of security policies and workflow management.

  • Risk Assessment with Secure Content Management

    Sponsored by: Micro Focus

    Tune into this webinar to learn how Micro Focus's Secure Content Management suite and its components help mitigate risk through the data assessment process.

  • 4 Cybersecurity Essentials that Your Board of Directors Wants to Know

    Sponsored by: Cymulate

    In this white paper, discover the 4 insights Cymulate provides based on quantifiable metrics to help you explain your current cybersecurity posture, defensibility, priorities, and ROI in ways that are most meaningful to your executive audience.

  • How to Guide: Zero Trust Security Transformation

    Sponsored by: Akamai Technologies

    The notion of a network perimeter can't be relied on in today's business landscape. A strategic security framework is needed. Download this guide to zero trust security for an understanding of what it is and why it's important for organizations to implement today.

  • Ensure Privacy Protection Through Your Digital Transformation

    Sponsored by: Micro Focus

    Today, the race to digital transformation is a vital one. However, as enterprises begin their digital transformation journey, they have to make privacy protection a top priority. In this webcast, Becky Arenson and Carole Murphy discuss how to minimize the risk of digital transformations with a unified technology framework.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.