Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk White Papers (View All Report Types)
 
Executive Review: Consumer Identity and Access Management
sponsored by Janrain
WHITE PAPER: Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Janrain

Accelerate Your Response to the GDPR
sponsored by Oracle
WHITE PAPER: This paper summarizes several key requirements of the GDPR and maps out how you can accelerate your response and comply with the regulation by May 2018.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Oracle

Top Trends That Will Shape CIAM in 2018 and Beyond
sponsored by Janrain
WHITE PAPER: In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Janrain

Veracode Integrations
sponsored by Veracode, Inc.
WHITE PAPER: As more organizations move to DevOps, application security needs to keep up or risk being left behind. Access this white paper to learn how you can integrate your application security with your security and development teams' existing tools and processes.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veracode, Inc.

Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Uncovered: IDC Explores the Benefits of Cloud-based Vulnerability Management
sponsored by Tenable, Inc.
WHITE PAPER: The shift to public cloud, along with mobile and DevOps, comes with an abundance of new assets for security pros to control and contain. How can you manage new vulnerabilities that result? Explore this IDC tech spotlight to how a cloud-based approach to vulnerability management can help.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Tenable, Inc.

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

The Buck Stops Where?
sponsored by BitSight
WHITE PAPER: By 2020, Gartner estimates that 75% of Fortune 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. In this white paper, gain insight into how data breaches are affecting both large and small businesses and how these businesses can mitigate their risks of future data breaches.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

BitSight

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement