Research Library

Powered by

Vulnerability Management Research

  • The Hacker Powered Security Report 2019

    Sponsored by: HackerOne

    Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.

  • Euronext Safeguards Pan-European Trading with Cymulate Breach and Attack Simulation

    Sponsored by: Cymulate

    Euronext, a leading pan-European marketplace, sought a more cost-effective way to test their security posture to complement the cyberattack simulations they have been running to date. After reviewing different solutions, Euronext decided to deploy Cymulate's Breach & Attack Simulation. In this case study, explore the benefits that Euronext saw.

  • Securing Transportation Infrastructure

    Sponsored by: Cyber-Ark Software

    Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.

  • State of the Web Report 2019

    Sponsored by: Tala Security

    The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.

  • Server Security Lies Deep in Hardware

    Sponsored by: HPE and Intel®

    Jump inside this white paper to learn how to adapt your server refresh strategy to the rising frequency of hardware attacks. Plus, get a closer look at some of the latest server models being purpose-built to withstand the capabilities of modern cyberattacks.

  • The Cybersecurity Effectiveness Podcast: Richard Seiersen

    Sponsored by: Verodin

    Seasoned cybersecurity veteran Richard Seiersen, current SVP & CISO at LendingClub and former VP of Trust and CISCO for Twillio, attributes success in any career to two things: metrics and measurement. In this podcast, he shares his contagious passion for security, the qualities of top engineers, his latest book, and more.

  • The Cybersecurity Effectiveness Podcast: Richard Stiennon

    Sponsored by: Verodin

    In this podcast, listen to Richard Stiennon, serial author, industry expert, and Chief Research Analyst at IT-Harvest, discuss how security is maturing at the executive leadership level.

  • Making Application & Infrastructure Vulnerability Management More Effective

    Sponsored by: ZeroNorth

    Organizations are struggling to keep up with the dizzying pace it takes to roll out new software capabilities, which only deepens the challenge of keeping up with risks across applications and infrastructure. In this white paper, discover 5 steps you can take to help begin your Application and Infrastructure Vulnerability Management Program.

  • Gaining Visibility into Risk and the ROI of Your Security Program

    Sponsored by: Verizon

    To make informed decisions about risk tolerance and security spending, it is critical to gain insight into the effectiveness of your security architecture, the threat landscape, and vulnerabilities. Download this IDC research report to explore how organizations can evaluate their security programs in the broader context of business risk.

  • Cybersecurity Effectiveness Podcast: IJay Palansky

    Sponsored by: Verodin

    While appealing new gadgets and innovative products continue to hit the market, legal firms caution organizations about the risks of IoT devices. In this podcast, technology-focused trial litigator IJay Palansky forecasts the impending boom of cyber litigation in the coming years and provides recommendations for avoiding an attack.

  • Cybersecurity Effectiveness Podcast: Mark Bagley

    Sponsored by: Verodin

    Cyber threat research is not all created equal – especially in the realm of security instrumentation. In this podcast, Mark Bagley, VP of Product at Verodin, highlights the core objectives of the Behavioral Research Team (BRT) and provides direction for scaling your organization's defenses with improved durability and efficiency in mind.

  • Do You Need a WAF, or Something Better than a WAF?

    Sponsored by: Shape Security

    The security market is drifting away from the use of web application firewall (WAF) technology for a number of reasons. In this blog post, learn about Shape Security's new solution which is a distributed anti-automation service, fronted by machine learning and backed by specialist operators.

  • Securing Hospitality IT Infrastructure

    Sponsored by: CyberArk Software, Inc

    When it comes to cybersecurity, the hospitality industry has a threat surface unlike any other vertical sector. Privileged accounts are everywhere in the hospitality industry technology stack. In this white paper, learn what hospitality organizations should do to reduce the risk posed to privileged access by attackers.

  • Vendor Analysis: Managed Security Services, Worldwide

    Sponsored by: Verizon

    MSSPs increasingly offer a wider and more varied set of services; however, Gartner has found most clients are primarily interested in contracting MSSPs for 24/7 remote security event monitoring and response services. In Gartner's Major Quadrant for Managed Security Services, explore strengths and cautions of vendors in the market.

  • Secure Your Business-Critical Applications

    Sponsored by: Onapsis

    An attack on your SAP and Oracle EBS applications would have a devastating impact on your organization's financial well-being and reputation, yet security remains a blind spot. In this solution brief, learn how Secure the Core by Onapsis protects your ERP systems from internal and external threats.

  • Ransom(Every)Ware

    Sponsored by: Neustar

    In what would become a troubling theme, WannaCry, and subsequent strains of ransomware, could have been prevented from becoming a public nuisance had proper maintenance and diligence been employed. In this white paper, learn how to prevent a ransomware attack at your organization.

  • The US Department of Homeland Security's Best Practices for Office 365 Security

    Sponsored by: Zoho

    As more organizations adopt Office 365, it's important to know the risks involved in this transition. In this report, The Cybersecurity and Infrastructure Security Agency (CISA) discusses the cloud services configuration vulnerabilities found in surveyed organizations. The report also recommends steps to mitigate these risks and vulnerabilities.

  • Securing Industrial Control Systems With Fortinet

    Sponsored by: Fortinet, Inc.

    In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.

  • Top Research For CIOs: Security

    Sponsored by: MASERGY

    Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.

  • Defend Yourself with Risk-Based Vulnerability Management

    Sponsored by: Arctic Wolf Networks, Inc.

    In this webcast, security expert Ian Hassard, Director of Product Management at Arctic Wolf Networks, shares top strategies on how to protect your business against phishing and ransomware attacks with rapid detection, response and remediation.

  • Industrial Controls System Vulnerabilities

    Sponsored by: Dragos

    In this report, explore key findings from the Dragos Intelligence team's analysis of ICS-specific vulnerabilities. Also discover the impacts, risk and mitigation options for defenders.

  • Double Kill, Other Favored Exploits, and How to Patch Against Them

    Sponsored by: Webroot

    Tune into this podcast where Hacker Files host Joe Panettieri talks with Webroot analysist Tyler Moffit about patching against the remote code execution flaw Double Kill and other exploits.

  • Top 10 Ways to Make Hackers Excited: About the Shortcuts Not Worth Taking

    Sponsored by: RSA Conference

    Designing secure architecture can always be more expensive, time consuming and complicated. But does it make sense to cut corners when hackers invent new attacks every day? Sooner or later, these shortcuts will translate to more harm and backfire. Watch this video from RSA Conference 2019 to learn how to eliminate mistakes.

  • Securing the Breadth of Enterprise Use Cases with PKI

    Sponsored by: Sectigo

    Download this white paper to learn how PKI can help you reduce risks of outage or breach, speed time of delivery, keep security standard high, future-proof your cryptography, maintain interoperability, free your valuable technical resources, and last but not least, save money.

  • Mastering Coverage

    Sponsored by: Contrast Security

    When it comes to application security testing, "coverage" is the third rail – a controversial topic for vendors and a seemingly intractable problem for practitioners – but it is the most critical part of your application security strategy. In this white paper, explore a framework for evaluating your application security testing coverage.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.