ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • Protecting the End User

    Sponsored by: Proofpoint

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organizations can take to build a people-centric defense.

  • A New Approach to Secure Mobile Banking Apps

    Sponsored by: Arxan

    To best secure your critical banking application, apps should be treated as an endpoint – and protection applied accordingly to prevent unprotected apps from becoming an attack vector. In this white paper, explore a new approach to app and endpoint security – with 3 transformational benefits for mobile banking apps.

  • CyberArk PAS Assessment Tool

    Sponsored by: CyberArk Software, Inc

    The commonality in most data breaches and cyberattacks is the exploitation of privileged accounts, credentials and access keys. In this solution brief, learn how CyberArk's Privileged Access Security Assessment Tool can help you evaluate your current privileged access security risk and vulnerabilities.

  • Qualcomm's Alex Gantman on Bug Bounties

    Sponsored by: HackerOne

    Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.

  • Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance

    Sponsored by: HackerOne

    Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.

  • The Zenefits Bug Bounty Story

    Sponsored by: HackerOne

    Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.

  • Salesforce Uses Bug Bounties to Protect Customer Data

    Sponsored by: HackerOne

    Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.

  • The Total Economic Impact Of Alert Logic SIEMless Threat Management

    Sponsored by: Alert Logic

    Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.

  • Come Hack With Me: The Anatomy of a Data Breach

    Sponsored by: Radware

    Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.

  • What Complying With Kari's Law Means For Your Business

    Sponsored by: Bandwidth

    Kari's Law requires direct dialing of "9-1-1" for emergency services to be enabled in enterprise environments and directs the FCC to develop necessary calling regulations for the multi-line telephone systems. In this white paper, learn how to bring your business into compliance with the law before the February 2020 deadline.

  • Avoid the Breach With Effective Application Security Testing

    Sponsored by: HackerOne

    Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.

  • Meet PCI DSS Requirements

    Sponsored by: HackerOne

    Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.

  • 2019 SonicWall Cyberthreat Report

    Sponsored by: SonicWall

    Even for organizations, businesses and governments, a cyberattack is personal. At its very core, they strip these establishments and employees of their identities, privacy, reputation and monetary assets. In SonicWall's 2019 SonicWall Cyber Threat Report, explore key advancements in the threat landscape.

  • DevOps Security for Cloud and Containers

    Sponsored by: Lacework

    In this e-book, learn how technology differences between development, staging, and product environments can lead to much larger security problems, how microservices deployed as containers help eliminate vulnerabilities, and much more.

  • Swinburne University of Technology Meets Its Essential 8 Mandate

    Sponsored by: Ivanti ANZ

    Following a risk assessment, Swinburne University determined that following the ASD Essential 8 recommended cybersecurity mitigation strategies would help ensure the strongest form of defense against a cyberattack. In this case study, learn how Swinburne was able to implement the ASD Essential 8 by implementing Ivanti's security portfolio.

  • ServiceNow Security Operations Infographic

    Sponsored by: ServiceNow

    Download this Forrester Total Economic Impact infographic for a summary of interview findings from 3 customers about their experience using ServiceNow Security Operations.

  • Protect Critical Infrastructures from Nation-State Attacks

    Sponsored by: enSilo

    Nation states funding allows cybercriminals to develop APT groups targeting discontinued, unsupported and outdated control systems, lacking relevant security measures. This is a combination for worldly disaster. In this resource, explore 5 ways your organization can defeat state sponsored attacks.

  • What is an Ounce of Cybersecurity Prevention Worth?

    Sponsored by: Verizon

    Data breaches and their costs are a major risk to your business. But they are a risk that can be mitigated. Understanding theft tactics based on the experiences of others is critically important. In this resource, explore tactics to help prevent data breaches and security holes in your organization.

  • Core Principles of Cyber Hygiene in a World of Cloud and Mobility

    Sponsored by: VMware and Intel

    No one wants to be the target of cybercriminals, but are you doing enough to protect your business? Many factors lead to security breaches, but there are 5 core principles that can help ensure you won't be the next victim featured on the nightly news. Download the whitepaper to learn how to address vulnerabilities before they become disastrous.

  • Illusive Networks Attack Risk Assessment

    Sponsored by: Mitigate Solutions - Illusive

    In the Illusive Networks Attack Risk Assessment, discover how an attack risk assessment can help identify hidden vulnerabilities in your network to minimize the risk of high-impact cyber events.

  • Turbocharge ITOps Productivity for Security and Efficiency

    Sponsored by: BMC

    It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell EMC

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell EMC

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • Top 10 Application Security Vulnerabilities for Developers

    Sponsored by: WhiteHat Security

    Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.

  • Open Source Network Security Tools for Beginners

    Sponsored by: AT&T Cybersecurity

    In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.