Business of Information Technology  >   Business Management  >   Risk Management  >  

Occupational Health

RSS Feed    Add to Google    Add to My Yahoo!
Occupational Health White Papers (View All Report Types)
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Safety Certification for Charging Stations
sponsored by TechData - Ergotron
WHITE PAPER: This white paper explores the significance of making sure that suppliers ensure device charging systems are safe as a whole, not as individually certified components. Learn about the risks of using non-certified products and how you can not only meet but exceed the existing safety and EMC regulatory requirements.
Posted: 13 Apr 2017 | Published: 30 Jun 2014

TechData - Ergotron

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

How To Modernize Your Enterprise To Combat Digital Disruption
sponsored by MuleSoft
WHITE PAPER: Digital disruption is having a profound effect on the nature of doing business, which in turn is having an equal effect on technology strategy and software development culture. Enterprises must innovate both quickly and efficiently order to stand out in the marketplace. Learn 3 recommendations for modernizing your enterprise.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

MuleSoft

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

Complex Decisions Made Simple With Structure and Tools
sponsored by Global Knowledge
WHITE PAPER: Structuring techniques are the foundation of decision making. There are a number of techniques that will quickly and easily improve the analysis of virtually any problem. This white paper introduces some of the simplest and most effective structuring techniques including sorting, sequencing, placement, decision trees, and ranking.
Posted: 23 Dec 2016 | Published: 23 Dec 2016

Global Knowledge

DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us
sponsored by Neustar
WHITE PAPER: Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.
Posted: 03 Oct 2016 | Published: 30 Sep 2016

Neustar

How are Banks Fighting the War on Fraud
sponsored by Neustar
WHITE PAPER: Discover how banks are fighting fraud, the amount of import they put on fraud and what they deem are the biggest impacts of fraud on their organization. Learn what to look for in an anti-fraud solution to balance security and customer convenience perfectly.
Posted: 03 Oct 2016 | Published: 31 Dec 2014

Neustar

Employees at the Frontline in the Battle Against Ransomware
sponsored by KnowBe4
WHITE PAPER: In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

2016 Security Operations Center Report
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Neustar
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement