Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Health

RSS Feed    Add to Google    Add to My Yahoo!
Environmental Health Reports
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

CIO Trends #3: Middle East
sponsored by ComputerWeekly.com
EGUIDE: In this Middle East e-guide we look at how CIOs can succeed in the age of digital transformation. Find out if you have what it takes because the opportunity is massive if you get digital right. There is also some advice for CIOs looking to get more out of their budget so they can fund digital initiatives.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

ComputerWeekly.com

Insights Into How Math Can Defeat Malware
sponsored by Dell India
WHITE PAPER: Malware has always evolved faster than security measures could keep up...until now. Access this white paper to learn about a math and machine-learning approach that enables you to identify potential threats based on mathematical risk factors, so that you can make the right decisions in real time.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell India

3 Risks in the Oil and Gas Industry to Overcome
sponsored by SNP America, Inc.
WHITE PAPER: During mergers and acquisitions (M&As), business operations must stay intact (and, in fact, speed up) while reducing risks. Learn how oil and gas companies are overcoming M&A challenges, and 3 key strategies for your organization to do the same.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SNP America, Inc.

Leverage On-Demand Testing with Vulnerability Analytics
sponsored by IBM
WHITE PAPER: Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

IBM

Secure and Accelerate User Access to Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Are we trusting social networks too much?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ComputerWeekly.com

Risk Assessment: The Roles Vendors and Frameworks Play
sponsored by BitSight
EGUIDE: Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.
Posted: 23 Feb 2017 | Published: 15 Feb 2017

BitSight

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement