ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • Implementing Effective Cyberprotection Demands New Approaches

    Sponsored by: NWN Corporation

    As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen provider should include.

  • New Topics on the New Security+ SY0-501 Exam

    Sponsored by: Global Knowledge

    In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.

  • Under the Hoodie 2019

    Sponsored by: Rapid7

    Due to the sensitive nature of its findings, penetration testing is a relatively unknown, yet critical, piece of the information security puzzle. This study by Rapid7 was an effort to demystify what goes on in a typical pen test by examining 180 engagements to break down what clients and practitioners should expect to see.

  • Open Source Network Security Tools

    Sponsored by: AT&T Cybersecurity

    With so many open-source tools available to help with network security, it can be tricky to figure out where to start. This beginner’s guide will provide you with the advice and expertise to help you navigate the extensive selection of tools. Read on to get started.

  • Accelerate Innovation with Automated Security

    Sponsored by: Sonatype

    The convenience of open source software for developers is unmatched. However, it’s critical to consider the vulnerabilities of open source software when developing security policies. In this white paper, go in-depth into the Nexus Platform for protecting your organization’s software development lifecycle.

  • Key Protection with Intertrust whiteCriterion Secure Key Box

    Sponsored by: Intertrust

    Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.

  • Connected Car Security

    Sponsored by: Intertrust

    As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.

  • Preparing for a Data Breach: Not If, But When

    Sponsored by: A-Lign

    When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.

  • The Beginner’s Guide to Bug Bounty Programs

    Sponsored by: HackerOne

    In The Beginners’ Guide to Bug Bounty Programs, discover how organizations including Starbucks, Airbnb, GitHub, Hyatt, Nintendo and Google Play are working with hackers to protect their customers and brands.

  • Automation Is a Security Pro’s Best Friend

    Sponsored by: FireMon

    The benefits of automation are universal no matter your industry. In this infographic, learn 7 reasons why automation is a security pro’s best friend including its ability to remove the manual tasks that often result in human error.

  • Critical Watch Report: 2019

    Sponsored by: Alert Logic

    SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.

  • Patch Management: Your Biggest Ally in the War Against Cybercrime

    Sponsored by: Panda Security

    The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.

  • Evaluating a Penetration Testing Company

    Sponsored by: InteliSecure

    Regardless of your company’s reasons for requiring pen testing, a primary factor in your test’s success is picking a provider who is capable of meeting your company’s specific goals. So where do you start? Use this 3-step guide to define your selection process and narrow down your choices.

  • Supporting NERC CIP Compliance

    Sponsored by: Claroty

    Electric industry asset owners are subject to mandatory cybersecurity regulations known as the NERC CIP standards. In this white paper, learn how Claroty's fully integrated platform supports entities' compliance efforts while helping to improve the cybersecurity and operational reliability of power generation and transmission systems.

  • Introduction to Claroty

    Sponsored by: Claroty

    In this webcast, Claroty's Dave Weinstein discusses how Claroty's solution helps IoT-OT security and operations teams discover IoT-OT assets on the network and identify vulnerabilities, continuously monitor networks and detect malicious activity and more.

  • Claroty A New Platform For OT Cybersecurity

    Sponsored by: Claroty

    Ensuring the security of industrial control systems (ICS) and the prevention or detection of cyberattacks and events is of increasing importance to users of these systems. In this white paper, learn about the Claroty platform which represents an innovative approach to addressing the specific challenges associated with cybersecurity in ICS.

  • Exploring Coordinated Disclosure

    Sponsored by: Veracode, Inc.

    Veracode commissioned 451 Research to gain a deeper understanding of the motivations of security researchers, actions when a vulnerability is identified, timing for disclosure, desired outcomes, how organizations structure disclosure policies, and the effectiveness of bug bounties. Read on to learn more.

  • The Global Risks Report 2019 14th Edition

    Sponsored by: Nozomi Networks

    Technology continues to play a profound role in shaping the global risks landscape. A top technological concern is cyberattacks which pose risks to critical infrastructure. In The Global Risk Report 2019, learn why the vulnerability of critical technological infrastructure is a growing national security concern.

  • Risk-Based Vulnerability Orchestration Across the Software Lifecycle

    Sponsored by: ZeroNorth

    This e-book explains the difference between automation and orchestration, why this matters and cost-effective steps you can take to begin mitigating risk. Read on to learn more.

  • Manufacturing Solution Brief

    Sponsored by: enSilo

    The manufacturing industry has been heavily targeted by cyberattacks in recent years. Download this solution brief to learn how enSilo delivers a complete endpoint protection platform that is able to uniquely meet the security and operational needs of the manufacturing industry.

  • Fidelis Endpoint : A Technical Deep Dive

    Sponsored by: Fidelis

    In this solution overview, learn how Fidelis Endpoint unifies endpoint detection and response (EDR) and endpoint protection platform (EPP) capabilities to meet the needs of IT endpoint management and mature security operations.

  • A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals

    Sponsored by: Radware

    The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell Technologies

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • How to Modernize Your Vulnerability Management Program

    Sponsored by: ServiceNow

    Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.