IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing Risk Reports
 
Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript
sponsored by Intel Security
WHITE PAPER: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Published: 01 May 2016

Intel Security

2016 Cyber Security Intelligence Index infographic for Retail
sponsored by IBM
WHITE PAPER: Get insight into recent cybersecurity incidents from the retail industry and beyond in this short infographic. Learn what security events occurred most effected retail in 2015 and what you can do to protect your organization moving forward.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

IBM

6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team
sponsored by ThreatConnect
WHITE PAPER: This paper outlines 6 steps you can take to prioritize threat data, automate manual tasks, and streamline your workflow. With the right tools in place, you can turn your small band of brothers into an army suited to take down all of today's sophisticated threats.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

Assessing Cybersecurity Risk in a Breached World
sponsored by Infocyte
WHITE PAPER: It's imperative you include regular compromise assessments as part of your information and IT risk management strategy. Enable your operations team to catch what prevention and monitoring technologies miss, and learn how to best mitigate the possible damage that can be caused from persistent compromises before hackers make their move.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

Infocyte

Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE: In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016

Check Point Software Technologies Ltd.

Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Published: 01 May 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover
sponsored by Intel Security
PODCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
sponsored by OneLogin
WEBCAST: In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.
Posted: 07 Jul 2016 | Premiered: Jun 1, 2016

OneLogin

Confidence in the Breach Age: Risks, Preparation, Response & Recovery
sponsored by AllClear ID
WEBCAST: Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.
Posted: 01 Jul 2016 | Premieres: Aug 20, 2016

AllClear ID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement