IT Risk Management Reports

12 top enterprise risk management trends in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
Posted: 20 Mar 2023 | Published: 20 Mar 2023

TechTarget ComputerWeekly.com

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Focus: Securing for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 08 Feb 2021 | Published: 10 Jan 2017

TechTarget ComputerWeekly.com

COVID-19 in APAC:Tech industry lessons & innovations
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.
Posted: 08 Feb 2021 | Published: 26 Mar 2020

TechTarget ComputerWeekly.com

Computer Weekly: Data Danger
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?
Posted: 08 Feb 2021 | Published: 14 Dec 2016

TechTarget ComputerWeekly.com

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Threat Intelligence Evaluator's Guide
sponsored by AT&T Cybersecurity
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

Privileged Account Security
sponsored by CyberArk
EGUIDE: 55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk

The Right Track to GDPR Compliance
sponsored by Lynx Technology Partners
EGUIDE: The GDPR is creating a pivotal change in how organizations process personal data, and it's clear there are a few areas of misunderstanding surrounding the regulation. Explore this expert e-guide to get a better understanding of the GDPR.
Posted: 27 Feb 2018 | Published: 21 Feb 2018

Lynx Technology Partners

Remote Work Best Practices Emphasize UC Collaboration Tools
sponsored by TATA Communications
EGUIDE: Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.
Posted: 06 Nov 2020 | Published: 04 Nov 2020

TATA Communications