Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk Management Reports
 
Preventing Insider Cyber Attacks
sponsored by IBM
WHITE PAPER: Access this white paper to learn how one identity and access management platform enables you to view all user activity and mitigate internal and external breach risk.
Posted: 27 Feb 2015 | Published: 17 Sep 2014

IBM

How to Protect Intellectual Property Against Data Breaches
sponsored by Websense
EGUIDE: The stakes and costs are high for any breached organization; the key now is to plan.  View this expert e-guide to learn the steps to protecting IP.
Posted: 03 Mar 2015 | Published: 04 Feb 2015

Websense

The Secure Third Party App Buyer's Guide
sponsored by Veracode, Inc.
WEBCAST: In this webcast, gain insider tips to mitigating risk when purchasing software from vendors. Watch now to learn the key considerations for buying and how to protect your data to avoid cyberattacks.
Posted: 02 Mar 2015 | Premiered: Aug 4, 2014

Veracode, Inc.

Safeguarding Mobile, Cloud, and Social Access
sponsored by IBM
WHITE PAPER: In this white paper, explore a number of strategies and solutions for protecting your data from malicious attacks on new access channels.
Posted: 02 Mar 2015 | Published: 17 Sep 2014

IBM

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

Case Study: Going Beyond Traditional GRC Utilities and Methods
sponsored by Hewlett-Packard Company
CASE STUDY: View now to learn how one financial services firm met regulatory obligation associated with vast quantities of structured and unstructured data.  Read on to learn how the firm secured, indezed, analyzed, and archived data across all media types.
Posted: 11 Mar 2015 | Published: 05 Feb 2014

Hewlett-Packard Company

Absence Management - A Guide to Developing a Strategy to Minimise Cost and Risk
sponsored by Workforce Software
WHITE PAPER: Access this white paper to find out why absence management is so important to minimizing cost and risk.
Posted: 20 Mar 2015 | Published: 31 Jan 2015

Workforce Software

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Survey Reveals the Danger of DNS Attacks
sponsored by Efficientip
WHITE PAPER: This survey on DNS attacks reveals how powerful DNS attacks are and what securities are most effective against them.
Posted: 05 Mar 2015 | Published: 30 Jun 2014

Efficientip
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement