ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • Vulnerability and Threat Trends Report 2018

    Sponsored by: Skybox Security

    This 18-page research report examines trends in vulnerabilities, exploits and threats in order to better align your security strategy with the current threat landscape.

  • Employee & Device Monitoring: Dispelling the Myths

    Sponsored by: Forcepoint

    Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program.

  • Reducing Cybersecurity Costs & Risk through Automation

    Sponsored by: Juniper Networks

    Tap into a Ponemon Institute study to see how organizations can save an average of $2.3 million annually by moving to cyber automation.

  • A Next-Generation Approach to Vulnerability Management

    Sponsored by: Skybox Security

    Vulnerability scanning is the focal point for most enterprise vulnerability management programs. This white paper uncovers a next-generation approach to vulnerability management and how it can improve the security gaps within networks.

  • Enabling and Securing Digital Transformation

    Sponsored by: CA Technologies

    Read this white paper to learn the specific challenges facing your organizations security capabilities and what's at stake. Then, evaluate how a comprehensive identity and access management system can help you minimize the threats to your environments.

  • Detect Unknown Threats, Reduce Dwell Time, And Accelerate Response

    Sponsored by: Dell and Intel

    Click inside to learn about an endpoint detection and response tool that can help you detect complex attacks. This system offers continual monitoring and analysis of user behavior in your endpoints, and more.

  • Lessons Learned from a Decade of Data Breaches

    Sponsored by: F5 Networks

    As cybercrime grows, how can you better protect your business? The answer is to start understanding how these criminals target their victims, and how they get in. In this research report, find out what aspect of your IT environment is being targeted by criminals, how criminals choose their victims, and more.

  • 2017 Application Security Statistics Report

    Sponsored by: Whitehat Securities

    According to the Verizon 2017 DBIR, 30% of total breaches reported involved attacks on web applications. This 60-page application security statistics report provides perspective on the present application security posture of hundreds of organizations, so that enterprises like yours can understand and improve their own security.

  • Vulnerable By Design: Why Destructive Exploits Keep On Coming

    Sponsored by: enSilo

    Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition uncover the differences between design and security vulnerabilities.

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

    Sponsored by: Rapid7

    In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.

  • Building a More Effective Vulnerability Scanning Program

    Sponsored by: Rapid7

    This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior.

  • Building a World-Class Web Application Security Program

    Sponsored by: Rapid7

    Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system.

  • IT/Security Alignment Paves the Way for Effective Risk Management at University of Salzburg

    Sponsored by: Rapid7

    Find out how the University of Salzburg's small IT team was able to gain simple reporting that helped them prioritize and remediate issues based off the needs of the organization in this case study.

  • Gain Deeper Insights into Your System with this Vulnerability Management System

    Sponsored by: Rapid7

    In this white paper, learn about a new vulnerability management system which can provide you with constant intelligence to discover, pinpoint, and prioritize threats to your business.

  • Vulnerability Management Buyer's Guide

    Sponsored by: Rapid7

    In this buyer's guide learn the 4 essential components in an effective vulnerability management (VM) program, as well as other considerations to take into account like the price, and ROI to take into account when shopping for your VM system.

  • Top 10 Business Logic Attack Vectors Attacking and Exploiting Business Application Assets and Flaws – Vulnerability Detection to Fix

    Sponsored by: Rapid7

    In this white paper, gain an overview of the top 10 business logic flaw attacks, as well as some tips on how you can test and eliminate these kinds of vulnerabilities.

  • When Software Goes Rogue

    Sponsored by: BDNA

    How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.

  • Infographic: Mitigating the Impact of Critical IT Events

    Sponsored by: Splunk Services UK Ltd

    Discover facts and figures regarding critical IT events (CIE) in this infographic. You'll learn the economic impact of CIE's, how they're negatively effecting organizations and learn mitigation techniques to reduce the damage caused by CIE's.

  • Cyber security solutions from IBM

    Sponsored by: IBM

    Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.

  • Demo: Next-Gen Antivirus in Action

    Sponsored by: Carbon Black

    Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: McAfee, Inc.

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Four Top Cybercrime Trends

    Sponsored by: IBM

    Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.

  • QRAT Malware-As-A-Service

    Sponsored by: Booz Allen Hamilton

    QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.

  • Protecting the Enterprise from User Security Vulnerabilities

    Sponsored by: RES Software

    Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.