Research Library

Powered by

Risk Management White Papers

  • Security Powered by Understanding

    Sponsored by: Armorblox

    Social engineering has become the top attack vector for stealing data, and even experienced users struggle to mitigate these risks. Traditional DLP solutions are ineffective in detecting such risks because they lack context. In this brief, learn how Armorblox brings contextual understanding to security.

  • High Alert Chapter 2: Skills Crisis Infographic

    Sponsored by: Symantec

    New research from Symantec uncovers the huge challenge organizations face in attracting, retaining and nurturing the right caliber of cybersecurity professionals. Download this infographic to find key statistics from the research. Also, explore 3 ideas for tackling the skills shortage.

  • Protecting Your Organization from Password Breaches

    Sponsored by: OneLogin

    With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.

  • CyberArk Global Advanced Threat Landscape Report 2019

    Sponsored by: CyberArk Software, Inc

    In order to gain a better understanding of business leaders' engagement with cybersecurity as global organizations transition to true digital businesses, CyberArk conducted a survey. The survey also focuses on the practice of privileged access security. Download the report to explore key findings.

  • Identity Governance: The Great Enabler

    Sponsored by: SailPoint Technologies

    To understand how leading organizations are governing the digital identities of their employees and enhancing security in an age of rapid digital transformation, Forbes insights in association with SailPoint surveyed 200 senior technology executives at mid-market corporations. Download this report to explore highlights.

  • The 2019 Identity Report

    Sponsored by: SailPoint Technologies

    Today's business world is constantly evolving, bringing new opportunities as well as new risks. In this research report, discover key findings from SailPoint's evaluation of IT leaders including 3 key identity-related challenges that face enterprises today.

  • The SIEM Buyer's Guide for 2020

    Sponsored by: Splunk

    The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.

  • Mitigating OT Cyber Risk with the Fortinet Security Fabric

    Sponsored by: Fortinet, Inc.

    Organizations are leveraging digital technologies such as IoT, cloud, artificial intelligence (AI), and others to optimize operations, improve safety and reliability, and gain a competitive edge.

  • Deconstructing the Risk of Public Cloud: 5 Use Cases

    Sponsored by: Fortinet, Inc.

    Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.

  • 15 Ways to Weed the Regulatory Violations Out of Your Spend

    Sponsored by: AppZen

    You may have a best-in-class system for approving expenses and accounts payable, but if you're not doing a thorough audit of all spend prior to disbursement, you likely have regulatory violations lurking in there. Download this e-book for a checklist on 15 ways to identify spend-related regulatory violations.

  • Fortinet 2019 Operational Technology Security Trends Report

    Sponsored by: Fortinet, Inc.

    Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.

  • State of Operational Technology and Cybersecurity Report

    Sponsored by: Fortinet, Inc.

    Recently, IT-based technologies have been integrated with operational technology networks to create new efficiencies and competitive advantages. However, this increases the digital attack surface and the risk of intrusion. In this research report, explore key findings from a survey of plant operations and manufacturing leaders.

  • Enterprise Governance, Risk, and Compliance for PeopleSoft

    Sponsored by: Appsian

    In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.

  • GDPR & PeopleSoft: Essentials for Compliance

    Sponsored by: Appsian

    Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.

  • CISO and Cybersecurity: A Report on Current Priorities and Challenges

    Sponsored by: Fortinet, Inc.

    The CISO and Cybersecurity Report from Fortinet takes a snapshot of how CISOs are approaching cybersecurity, and how their organizations view the CISO. In this report, explore key takeaways from a survey of CISOs at large enterprises.

  • 5 Critical Mistakes When Evaluating a Next-Generation Firewall

    Sponsored by: Palo Alto Networks

    The firewall is the foundation of enterprise data security. All firewalls are not created equal, though, and no 2 organizations have the same needs, risks, and data flow. In this resource, explore 5 critical mistakes to avoid when evaluating a new next-generation firewall and selecting the perfect fit.

  • How to Boost Your Breach Defense: A 3-Part Plan

    Sponsored by: Micro Focus

    Even the strongest, most protected networks can be brought to their knees with just 1 minor misstep. Thus, the cyber defender has to protect against all attack vectors. In this blog, learn how you can help secure your organization by adopting a 3-part security model consisting of security in depth, DevSecOps, and security validation.

  • 13 Things Your Next Firewall Must Do

    Sponsored by: Palo Alto Networks

    The rapid evolution of IT has changed the face of the network perimeter. The result is an incredibly complex network that introduces significant business risk. In this white paper, explore the evolution of the firewall to "next-generation" and discover 13 key things a next-generation firewall must do to secure your network and your business.

  • Top Research For CIOs: Security

    Sponsored by: MASERGY

    Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.

  • Independent Study Pinpoints Significant SCADA/ICS Security Risks

    Sponsored by: Fortinet, Inc.

    Many organizations beyond electric and water utilities have deployed SCADA/ICS as they look to automate their data collection and their equipment. However, the technologies have become high-value targets for hackers. In this research report, explore common SCADA and ICS threats and find recommendations for mitigating the risks they pose.

  • Artificial Intelligence In Banking and Risk Management

    Sponsored by: SAS

    How real are the benefits of AI? Inside, review the costs, benefits, and risks of AI with insight from over 2,000 GARP/SAS survey respondents. Review the top use areas of AI in the modern day enterprise, and explore how AI can help your organization flourish.

  • 7 Steps to Secure Your Supply Chain

    Sponsored by: RackTop Systems

    Supply chain security requires a multifaceted approach to protecting the checkpoints, assets and infrastructures involved with the production of a product. In this resource, explore 7 steps to securing your supply chain.

  • Industrial Controls System Vulnerabilities

    Sponsored by: Dragos

    In this report, explore key findings from the Dragos Intelligence team's analysis of ICS-specific vulnerabilities. Also discover the impacts, risk and mitigation options for defenders.

  • Keeping Fraud Detection Software Aligned With the Latest Threats

    Sponsored by: SAS

    Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.

  • Balancing Fraud Detection and the Customer Experience

    Sponsored by: SAS

    Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.