![Cover for Continuous threat exposure management - The evolution of vulnerability management](https://www.bloorresearch.com/wp-content/uploads/edd/2024/06/00002850-VIAVI-CTEM-eBook-cover-.jpg)
Continuous threat exposure management - The evolution of vulnerability management
Published: 19th June 2024 | By: Fran Howarth
Continuous threat exposure management (CTEM) is an advanced form of vulnerability management technology that will enable organisations to continuously improve their security posture.
![Cover for Generative AI Value & Limitations](https://www.bloorresearch.com/wp-content/uploads/edd/2023/09/00002878-eBook-Generative-AI-Value-cover-thumbnail-.jpg)
Generative AI Value & Limitations
Published: 12th September 2023 | By: Andy Hayler
Generative AI has many use cases across industries as well as some limitations.
![Cover for Myths, Promises & Threats: Generative Al for the Enterprise](https://www.bloorresearch.com/wp-content/uploads/edd/2023/09/Myths-promises-and-threats-ebook-cover.jpg)
Myths, Promises & Threats: Generative Al for the Enterprise
Published: 1st September 2023 | By: Robin Bloor
Generative AI (GAI) has emerged as another transformative technology. It offers dramatic benefits, but may also foster chaos.
![Cover for Top data integration qualities to watch out for in 2023](https://www.bloorresearch.com/wp-content/uploads/edd/2023/03/00002743-TOP-DATA-INTEGRATION-QUALITIES-2023-eBOOK-cover.jpg)
Top data integration qualities to watch out for in 2023
Published: 14th March 2023 | By: Daniel Howard
This document discusses the five most important qualities that a data integration solution should strive for in 2023.
![Cover for The GLASS Difference](https://www.bloorresearch.com/wp-content/uploads/edd/2023/02/00002738-The-GLASS-Difference-eBook-cover.jpg)
The GLASS Difference
Published: 1st February 2023 | By: Daniel Howard
Ground Labs leverages a bespoke pattern matching engine, GLASS, to discover critical data – even when it is not obvious that it is sensitive.
![Cover for The state of data analytics - Key challenges in a strict security and privacy environment](https://www.bloorresearch.com/wp-content/uploads/edd/2022/12/00002735-PRIVITAR-State-of-Data-Provisioning-eBook-cover-thumbnail-.jpg)
The state of data analytics - Key challenges in a strict security and privacy environment
Published: 7th December 2022 | By: Fran Howarth
Read this report to understand the current state of data provisioning and analytics, including the goals and challenges for organisations.
![Cover for MDR: a path to outcome-based security - Keys to defining and deriving value](https://www.bloorresearch.com/wp-content/uploads/edd/2020/11/00002601-ALERT-LOGIC-eBOOK-cover-thumbnail-.jpg)
MDR: a path to outcome-based security - Keys to defining and deriving value
Published: 13th November 2020 | By: Fran Howarth
By taking into account the considerations in this eBook, organisations will be better informed as to what they need from an MDR service provider.
![Cover for GRC realities - what are organisations really doing?](https://www.bloorresearch.com/wp-content/uploads/edd/2019/02/grc-realities-ebook-cover.png)
GRC realities - what are organisations really doing?
Published: 8th February 2019 | By: Fran Howarth
Every organisation faces risk, uncertainty and security threats, yet must comply with a host of regulations. GRC helps to manage those issues to keep an organisation on track.
![Cover for Project Social - Why is it essential for Workforce Wellness?](https://www.bloorresearch.com/wp-content/uploads/edd/2019/02/project-social-ebook-cover.jpg)
Project Social - Why is it essential for Workforce Wellness?
Published: 5th February 2019 | By: David Norfolk
OpusView enables collaborative workforce wellness.
![Cover for State of Industrial and OT Security Report 2018](https://www.bloorresearch.com/wp-content/uploads/edd/2018/12/ebook-state-industrial-and-ot-security-report-2018-cover.jpg)
State of Industrial and OT Security Report 2018
Published: 18th December 2018 | By: Fran Howarth
Bloor Research undertook a survey of 370 industrial organisations to ascertain what security measures they are taking to secure their operational technology (OT) networks.