Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk Management White Papers (View All Report Types)
Don't Wait Until Next Year to Build Better Defenses
sponsored by Intel Security
WHITE PAPER: This infographic discusses how you can implement endpoint security that's suitable for today's advanced targeted attacks.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Intel Security

Continuous Security Monitoring
sponsored by Qualys
WHITE PAPER: Hackers will eventually get in, and when they do, you need to be able to detect them before they do any lasting damage. This white paper discusses the importance of continuous security monitoring (CSM) and gives advice for effectively implementing it.
Posted: 16 Oct 2015 | Published: 25 Sep 2013


Defending against DDoS Attacks in the Financial Sector
sponsored by Akamai
WHITE PAPER: This white paper discusses how you can protect your financial organization against sophisticated DDoS attacks.
Posted: 17 Nov 2015 | Published: 05 Nov 2015


Protect Against Threat Propagation and Damage in the Internal Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines how to add an additional security layer to your network with an internal segmentation firewall. Learn how to segment the access of potential threats vectors to critical resources, and limit potential breach damage in your internal network.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

Fortinet, Inc.

The Next Stage in Creating the Value-Added Finance Function
sponsored by SAP
WHITE PAPER: In the fall of 2014, CFO Research conducted a survey among senior finance executives at large companies to explore developments in the ways that finance functions employ advanced information capabilities to support business operations. This resource details the full findings of this survey.
Posted: 18 Sep 2015 | Published: 31 Oct 2014


From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

Case Study: Protecting Patient Data in the Public Cloud
sponsored by Alert Logic
WHITE PAPER: Access this case study to learn how a health organization secured delicate genomic data in a public cloud environment.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Alert Logic

Gartner Critical Capabilities for SIEM
sponsored by Intel Security
WHITE PAPER: As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Posted: 23 Oct 2015 | Published: 25 Jun 2014

Intel Security

Network Security Case Study: Stealthy Tactics Define a Russian Cyber Threat Group
sponsored by FireEye
WHITE PAPER: This network security report will introduce you to HAMMERTOSS and the 5 stages of its attack, as well as how to combat threats such as these that undermine network defenders.
Posted: 24 Sep 2015 | Published: 24 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement