ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Evaluating Vulnerability Risk Management Providers

    Sponsored by: Rapid7

    As vulnerability risk management evolves to address customers’ needs, this Forrester Wave seeks to highlight solutions that help customers prioritize remediation efforts. In the report, explore an evaluation of 13 vulnerability risk management providers.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • Critical Watch Report: 2019

    Sponsored by: Alert Logic

    SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.

  • Weighing the Risks: The Real Costs of a Data Breach

    Sponsored by: Citrix

    Work has moved beyond office walls, and attackers are adapting. Defending against the attacks of today with yesterday’s tools and techniques can’t keep your systems and data secure. Download this infographic to learn how you can reduce risk and boost productivity with Citrix Workspace.

  • Penetration Testing: Protect Critical Assets Using an Attacker’s Mindset

    Sponsored by: IBM

    The proliferation of financial losses and brand damage stemming from security breaches means organizations need to be proactive in protecting their most valued assets. In this white paper, learn how IBM X-Force Red penetration testing services can help your organization identify and fix critical vulnerabilities before criminals exploit them.

  • The Practical Executive's Guide to Data Loss Prevention

    Sponsored by: Forcepoint

    As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.

  • A Risk-Adaptive Approach to Dynamic Data Protection

    Sponsored by: Forcepoint

    By using Dynamic Data Protection, organizations can automate policy enforcement to dynamically respond to changes in risk within an organization. Read on to learn more about the end-to-end, human-centric security architecture.

  • Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System

    Sponsored by: Claroty

    A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.

  • The Real Risk to ICS Environments

    Sponsored by: Dragos

    The cyber risk to industrial control systems (ICS) is significant, growing and largely unmanaged against the real threats facing ICS. In this white paper, learn how applying ICS-specific threat intelligence to GRC can greatly reduce an organization's risk profile and help meet compliance mandates.

  • Enabling Effective Data Protection

    Sponsored by: InteliSecure

    Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.

  • Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority

    Sponsored by: Mimecast

    If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.

  • The Global Risks Report 2019 14th Edition

    Sponsored by: Nozomi Networks

    Technology continues to play a profound role in shaping the global risks landscape. A top technological concern is cyberattacks which pose risks to critical infrastructure. In The Global Risk Report 2019, learn why the vulnerability of critical technological infrastructure is a growing national security concern.

  • Case Study: Electronic Manufacturing

    Sponsored by: enSilo

    A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.

  • On the Radar: IBM Resilient Applies Incident Response Orchestration to GDPR Data Breaches

    Sponsored by: IBM

    Download Ovum's On the Radar Report to learn how the IBM Resilient SOAR Platform simplifies breach notification by using built-in guidance and templates to track breach management and reporting tasks, privacy-focused assessment to help determine who to notify, and regularly updated breach notification requirements.

  • 2019 State of OT/ICS Cybersecurity Survey

    Sponsored by: Nozomi Networks

    In this 2019 SANS OT/ICS cybersecurity survey, explore the challenges with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations.

  • Detecting and Preventing Cybercrime and Fraud

    Sponsored by: Concur Technologies

    In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.

  • The New Age of Fraud

    Sponsored by: Concur Technologies

    Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.

  • How Do You Cultivate Compliance to Protect Your Business?

    Sponsored by: Concur Technologies

    Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.

  • Securing Transportation Infrastructure

    Sponsored by: Cyber-Ark Software

    Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.

  • The Human Factor 2019 Report

    Sponsored by: Proofpoint

    Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.

  • 6 Degrees of Network Security

    Sponsored by: Cisco Umbrella

    A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Download this infographic to uncover 6 common security pitfalls that put your users, their devices, and your data at risk.

  • TPCRM 101: A Guide for Beginners

    Sponsored by: CyberGRX

    As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.

  • Rethinking Third-party Cyber Risk Management

    Sponsored by: CyberGRX

    In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.

  • 15 Ways to Weed the Regulatory Violations Out of Your Spend

    Sponsored by: AppZen

    How can your organization secure a seamless spend audit? View this checklist to uncover 15 ways to weed regulatory violations out of all spend prior to disbursement, and get the tools you need to secure a seamless spend audit.

  • Hype Cycle for Privacy, 2019

    Sponsored by: TITUS

    Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.