Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk Management White Papers (View All Report Types)
Advanced Threat Detection and Remediation: Why it's Needed
sponsored by Hewlett-Packard Company
WHITE PAPER: An effective security program must not only attempt to detect and block incoming threats; it must detect and neutralize successful attacks before the damage is done, too. This white paper explains why advanced threat detection is now a necessary part of any cyber security program.
Posted: 09 Sep 2015 | Published: 09 Sep 2015

Hewlett-Packard Company

The Next Stage in Creating the Value-Added Finance Function
sponsored by SAP
WHITE PAPER: In the fall of 2014, CFO Research conducted a survey among senior finance executives at large companies to explore developments in the ways that finance functions employ advanced information capabilities to support business operations. This resource details the full findings of this survey.
Posted: 18 Sep 2015 | Published: 31 Oct 2014


How Insecure Keys and Certificates Can Put You at Risk
sponsored by Venafi
WHITE PAPER: This white paper describes how hackers use insecure keys and certificates to compromise a network and gives you tips on making yours more secure.
Posted: 09 Sep 2015 | Published: 09 Sep 2015


Selecting a Managed Security Services Provider: 10 Essential Criteria to Consider
sponsored by IBM
WHITE PAPER: This white paper provides the top ten criteria than can help you ensure that you're selecting the right MSSP.
Posted: 08 Sep 2015 | Published: 31 Mar 2014


The Art of Cyber War: A Modern Defense Strategy
sponsored by Imprivata
WHITE PAPER: In this white paper, you'll find indispensible tips on maintaining security and winning the battle against cybercrime.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013


How Vulnerable is Critical Infrastructure to Cyber Attacks?
sponsored by MASERGY
WHITE PAPER: This article discusses the unique risks facing the public sector, financial institutions, and utility organizations
Posted: 17 Sep 2015 | Published: 20 Jul 2015


Are Cybercriminals Hiding in Your SSL Traffic?
sponsored by Venafi
WHITE PAPER: This white paper examines how hackers can hide their exploits in encrypted SSL traffic and suggests ways you can stop them.
Posted: 10 Sep 2015 | Published: 10 Sep 2015


Compliance Made Easy
sponsored by HyTrust
WHITE PAPER: This resource introduces a comprehensive solution that can mitigate the risks of the virtualized infrastructure and support compliance with relevant regulatory requirements, including PCI, HIPAA and more.
Posted: 06 Oct 2015 | Published: 10 Aug 2015


Stories in Information Governance: The IGI 2015 Benchmarking Report
sponsored by Hewlett-Packard Company
WHITE PAPER: In this in-depth report, you'll learn what other IG practitioners are doing to ensure their information governance strategies are effective and successful and how to apply their approaches to your organization. View now to learn insider tips to overcoming information governance obstacles.
Posted: 21 Sep 2015 | Published: 09 Sep 2015

Hewlett-Packard Company
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement