Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk Management Reports
Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This white paper breaks down the 20 critical security controls developed by SANS, discussing how you can best follow them.
Posted: 16 Oct 2015 | Published: 31 Mar 2013


CISOs: Dos and Don'ts for Incident Response Management
sponsored by IBM
EGUIDE: This two-part guide includes an in-depth interview with corporate attorney and cybersecurity insider Chris Pierson on incident response planning and the role that a CISO should play. Next, IT service providers will uncover vital information on protecting SMB customers from sophisticated cyberattacks.
Posted: 03 Nov 2015 | Published: 02 Nov 2015


How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015


Ten Top Tips on Keeping Your Business Secure
sponsored by Sage (UK) Limited
WHITE PAPER: From incident response to user education, this white paper lists the top ten steps you need to take to keep your business secure.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Sage (UK) Limited

Incident Response Spend Up As Firms Recognize Cyber-Attacks Are Inevitable
sponsored by IBM
EGUIDE: Access this expert guide to learn why an effective incident response plan may be your best defense against today's increasingly personalized cyber-attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Protect Against Threat Propagation and Damage in the Internal Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines how to add an additional security layer to your network with an internal segmentation firewall. Learn how to segment the access of potential threats vectors to critical resources, and limit potential breach damage in your internal network.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

Fortinet, Inc.

Practical Threat Management for Healthcare Organizations
sponsored by AlienVault
WHITE PAPER: This white paper can help you overcome some of the many hurdles that healthcare security faces. Read on to keep your compliance needs met and your patient data safe.
Posted: 23 Oct 2015 | Published: 31 May 2015


Vendor Comparison: Choose the Right DDoS Service Provider
sponsored by Akamai
WHITE PAPER: This Forrester report examines nine of the most significant offerings in the DDoS protection market, giving you insight into the strengths and weaknesses of each one.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


Managing the Insider Threat with Active Directory Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper discusses the dangers malicious actors pose to Active Directory and gives suggestions for AD security best practices.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Dell, Inc.

Growing Cyber Threats Challenging Cost Reduction as Reason To Use Managed Services
sponsored by IBM
EGUIDE: This expert guide delves deeper into the results of a recent survey finding that over a third of IT operations in mid-sized companies will make the move to an outsourced managed service over the next 5 years as IT directors chase greater security and reduced costs.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement