Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk Management Reports
 
Creating a Powerful Anti-Malware Defense
sponsored by Malwarebytes Corporation
WHITE PAPER: In today's high-risk cybercrime environment, anti-malware and anti-exploit software need to be implemented on top of basic anti-virus. Read this white paper to learn more about successfully doing so.
Posted: 07 May 2015 | Published: 07 May 2015


Defending Against New Ransomware Threats
sponsored by Trend Micro
WHITE PAPER: In this white paper, discover five ways to make sure you're prepared for a ransomware attack.
Posted: 11 May 2015 | Published: 11 May 2015

Trend Micro

Information Governance: Fighting Back Against the Exponential Data Curve
sponsored by Symantec | Veritas
WHITE PAPER: This white paper focuses on information governance, specifically fighting back against the exponential data growth we are facing.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Symantec | Veritas

Powerful Anti-Malware for Your Mobile Device
sponsored by Malwarebytes Corporation
WHITE PAPER: Those who haven't yet secured their mobile devices are courting serious risk. In this white paper, discover what mobile anti-malware can do to bolster your mobile security.
Posted: 07 May 2015 | Published: 07 May 2015


Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 02 Jul 2015 | Published: 28 Feb 2014

Mimecast

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, security expert Andrzej Kawalec explores how to create an efficient cybercrime response plan for fast threat mitigation and for protection of your company's reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Secure Federal Data and Support Your Mobile Workforce
sponsored by Absolute Software
WHITE PAPER: This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.
Posted: 06 May 2015 | Published: 06 May 2015

Absolute Software

Survey Shows Plenty of Room for Improvement in IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: A new survey from IDG Research Services reveals that most organizations lack confidence in their security defenses. Read this report to learn why, and how you can build security that's worth having confidence in.
Posted: 06 May 2015 | Published: 06 May 2015

Hewlett-Packard Company

Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST: This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014

Absolute Software

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement