ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • SecOps Cybersecurity Best Practice Guide

    Sponsored by: Covestic

    Cybersecurity incidents impact your bottom line. If you need evidence, Equifax’s breach cost them an estimated $4 billion in revenue. On a smaller scale, legal fees of cybersecurity litigation can cost about $2.5 million. The next step in your security journey may cost less than you think. Open this guide for 5 cybersecurity best practices.

  • Phishing Factories Exploit Trust to Attack Businesses

    Sponsored by: Akamai Technologies

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • BlackBerry MITRE ATTACK APT29 Evaluation

    Sponsored by: BlackBerry

    In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.

  • Lockdown Lessons

    Sponsored by: Webroot

    Network security is the immune system of an organization. If a business does not maintain a healthy immune system, then it’s vulnerable to a host of rapidly evolving threats. If you want to learn how to best secure your network, read this white paper from Webroot, which details best practices and innovative methods of protection.

  • Now We’re All Working from Home, We Need to Become More Cybersecurity Aware

    Sponsored by: Kaspersky Lab

    Remote access, passwords, security awareness, cybersecurity, cyber-awareness, endpoint security: All are keywords and phrases that you need to prioritize if you haven’t already. They should be top-of-mind alongside trust, device management and patching. Browse this article for literature on the required increase in security and security awareness.

  • 2020 Webroot Threat Report

    Sponsored by: Webroot

    In 2019, 93.6% of malware detected was only seen on a single PC. This is significant because it shows that it only takes one mistake from one employee to compromise a network. Organizations are looking for ways to defend against threats, but to do so, they must first know their enemy. Read this threat report to see the statistics of cybersecurity.

  • Privileged Access Management Policy Template

    Sponsored by: Thycotic

    In order to protect privileged accounts against misuse, organizations are establishing privileged access management (PAM) policies. The following guide highlights a 10-step process for customizing a PAM policy template, designed to help your team build a policy based around your unique security and compliance requirements.

  • The Role of Insider Threat Management Software Platforms

    Sponsored by: Proofpoint

    As workplace trends and cyberthreats evolve, so too should the methods used to mitigate risk and ensure user protection. This e-book takes a closer look at the growing risk of insider threats and explores the capabilities of the ObserveIT platform, Proofpoint’s insider threat management software platform.

  • Insider Threat Management and Cybersecurity Tools

    Sponsored by: Proofpoint

    The traditional notion of a perimeter is a thing of the past, people are the new perimeter. In this e-book, discover the tools and tactics organizations are using to defend against insider threats – evaluating the strengths and weaknesses of each approach and underlining the importance of people-centric security.

  • An Overview of Insider Threat Management

    Sponsored by: Proofpoint

    The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.

  • A Guide to Setting Up Your Insider Threat Management Program

    Sponsored by: Proofpoint

    In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.

  • TikTok Case Study

    Sponsored by: Lookout

    Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.

  • Dynamic Data Protection

    Sponsored by: Forcepoint

    The following solution brief provides an inside look into Forcepoint Dynamic Data Protection, which combines behavior analytics with data protection capabilities to enable your organization to prioritize high-risk activity and automate policies – ensuring security without sacrificing productivity. Read on for an overview of the key features.

  • Enterprise Data Protection Solutions, Explained

    Sponsored by: Forcepoint

    Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.

  • 9 Steps to Success with Data Protection

    Sponsored by: Forcepoint

    Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.

  • Aligning Cyber Risk Management with Business Performance

    Sponsored by: Coalfire

    Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.

  • Less Hackable

    Sponsored by: ThreatLocker

    The problem that many businesses face when trying to secure their cyber environments is that they do not understand the risks involved. In this white paper, gain a better understanding of common cyber risks and learn how those risks can be reduced to an acceptable level.

  • Quantum Computing and Quantum-Safe Security

    Sponsored by: Thales

    Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.

  • Is Your Front Door Open and Unlocked for Cyber Criminals?

    Sponsored by: Verizon

    When it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.

  • Mobile Security Index 2020

    Sponsored by: Verizon

    Mobile technology and the cloud are enabling and medium-sized businesses to grow and compete with larger enterprises more effectively. But unless they take further steps to secure their mobile devices, SMBs could face significant damage to their reputations and bottom lines before the competition even begins.This infographic explains in detail.

  • 8 Simple Steps for Automating Governance, Risk, and Compliance in Financial Services Organizations

    Sponsored by: ServiceNow

    Managing layers of local, regional, and global regulation is an exceedingly complex endeavor for financial services organizations. However, automating Governance, Risk, and Compliance (GRC) processes can significantly mitigate the risks of running afoul of regulators. In this resource, explore a checklist with 8 simple steps for automating GRC.

  • Analyst Report: Governance, Risk, And Compliance Platforms, Q1 2020

    Sponsored by: ServiceNow

    In this most recent edition of The Forrester Wave: Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.

  • Securing Your Cloud Solutions for Government Adoption

    Sponsored by: Coalfire

    FedRAMP establishes cybersecurity requirements for CSPs that deliver solutions to the federal market and utilizes independent experts to advise organizations and assess their compliance. In this report, assess the market and industry dynamics that affect both FedRAMP and cloud adoption in the federal government.

  • 5 Reasons your SMB workspace needs simple SSO

    Sponsored by: Citrix

    SSO should make life easier for both IT and employees. But when new apps require different SSO tools from different vendors, it can complicate your IT. Adopting simple, unified SSO for your workspace can ensure secure, anywhere access to all essential applications.This e-book gives five reasons why your organization needs simple, unified SSO.

  • 5 Things Better Connectivity Can Help You Achieve

    Sponsored by: Verizon

    By 2025, the average connected person will interact with a connected device nearly 4,800 times per day—about once every 18 seconds. If your organization’s network is not amply prepared, you will be at risk of falling behind. Access this infographic for 5 business advantages of increasing connectivity and how they impact your bottom line.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.