Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk Management Reports
Vulnerable By Design: Why Destructive Exploits Keep On Coming
sponsored by enSilo
WHITE PAPER: Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition uncover the differences between design and security vulnerabilities.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

The Good Shepherd Model for Cybersecurity, Privacy, And Regulatory Compliance
sponsored by Nuix
WHITE PAPER: Data breaches are inevitable - If you can't prevent hackers or insiders from getting into your organization's network, it's vital to minimize the damage they can cause. This white paper reveals four rules for protecting private data to improve compliance with privacy regulations.
Posted: 17 Jan 2018 | Published: 17 Jan 2018


Compliance: Unlocking the Data that Matters
sponsored by BT
WHITE PAPER: Improving the safety and resilience of the financial markets, along with fighting financial crime, has risen to the top of companies' agendas. In this white paper, uncover compliance challenges for risk teams in the financial sector as well as ways to gain compliance while maintaining the safety of clients' information.
Posted: 22 Nov 2017 | Published: 22 Nov 2017


Mitigate the Top 9 Cloud Threats with a Cloud Access Security Broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: According to Cloud Computing Trends: 2017 State of the Cloud Survey, today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Oracle Corporation

Data + Security = A Most Unvirtuous Relationship
sponsored by Delphix
RESOURCE: Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.
Posted: 21 Nov 2017 | Published: 21 Nov 2017


Why Device Risk is an Essential Element for Your MFA Strategy
sponsored by iovation, Inc.
WEBCAST: Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.
Posted: 13 Dec 2017 | Premiered: Oct 31, 2017

iovation, Inc.

Measuring Cybersecurity Preparedness
sponsored by Dell SecureWorks
WHITE PAPER: According to the 2017 Cybersecurity Breaches Survey, 7 in 10 large UK enterprises experienced an attack or breach within the past 12 months. This Frost & Sullivan white paper reveals the overall cybersecurity preparedness of large UK organizations and places organizations in 3 categories: underprepared, in transition and security leaders.
Posted: 18 Dec 2017 | Published: 18 Dec 2017

Dell SecureWorks

How to Handle a Ransom Driven DDoS Attack
sponsored by Corero Network Security
WHITE PAPER: Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Corero Network Security

Security Obligations for Enterprises Using Cloud Services
sponsored by Oracle Corporation
WHITE PAPER: 77% of organizations have already adopted cloud services and 10% of those companies using cloud services describe themselves as heavy users, according to Oracle. Explore this white paper to gain insight into the shared responsibility model as well as cloud using security techniques.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Oracle Corporation

Staying Secure is All About Keeping One Step Ahead
sponsored by BT
WEBCAST: With the dramatic explosion of cyberattacks, it is necessary to constantly monitor for threats rather than reacting to them after the fact. This brief webcast offers strategies of staying one step ahead of the next security threat, in order to give your enterprise the security it needs.
Posted: 30 Nov 2017 | Premiered: Nov 30, 2017


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement