Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis Reports
 
10 Tips to Stay Safe Against Ransomware and Advanced Threats
sponsored by Barracuda Networks
WHITE PAPER: Your organization, no matter the size or industry, is now a target for ransomware, phishing, and advanced persistent threats. But there's a lot you can do to reduce the risk. Download this white paper now and discover 10 tips for preventing these attacks.
Posted: 31 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

How to Keep Your Data Secure In An Increasingly Insecure World
sponsored by Micron
WHITE PAPER: Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.
Posted: 13 Feb 2017 | Published: 01 Nov 2015

Micron

Manage Application Security Risks to Help Protect your Organization’s Critical Data
sponsored by IBM
WHITE PAPER: Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

IBM

The Benefits of Bug Bounty Programs and Security Code Testing
sponsored by Veracode, Inc.
RESEARCH CONTENT: In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Object Storage 101
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

How to Transform Employee Worst Practices Into Enterprise Best Practices
sponsored by KnowBe4
WHITE PAPER: Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
WHITE PAPER: Discover why and how IT security strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.
Posted: 06 Dec 2016 | Published: 30 Nov 2016

arcserve

SIEM Analysis Interfaces for Security Professionals
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement