Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk Management Reports
Inside the Dyre Wolf Malware Campaign
sponsored by IBM
WHITE PAPER: This white paper gives a step-by-step outline of how the Dyre Wolf attack is accomplished and how organizations can detect and prevent compromise.
Posted: 08 Sep 2015 | Published: 30 Jun 2015


How to Detect and Defend against Fraudulent Certificates
sponsored by Venafi
EGUIDE: In this expert guide, you'll find tips on detecting and mitigating the fraudulent certificates used by the Flame malware, Zeus, and more.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Social Threat Intelligence: A New Way to Stay Ahead of Hackers
sponsored by Threatstream
PODCAST: This podcast explores social threat intelligence, a new approach to threat intelligence that enables you to share threat information with other businesses in real time.
Posted: 25 Sep 2015 | Premiered: Jun 15, 2015


Best Practices for Classifying and Protecting Sensitive Data
sponsored by Identity Finder, LLC
WHITE PAPER: This white paper presents practical recommendations for discovering and classifying data and discusses the benefits of data classification.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

Data Protection and Business Continuity in a Mobile World: A Guide for SMBs
sponsored by Hewlett-Packard Company
WHITE PAPER: This report discusses the specific security challenges that face SMBs and gives advice for how they can keep their data secure with the resources they have.
Posted: 30 Sep 2015 | Published: 30 Jun 2015

Hewlett-Packard Company

Infographic: Is Your Data Classified?
sponsored by Identity Finder, LLC
WHITE PAPER: In a world where classifying your sensitive data prevents and reduces risk for 75% of breach events, it's in your best interest to be prepared. Access this infographic and learn methods for tackling classification.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

How Insecure Keys and Certificates Can Put You at Risk
sponsored by Venafi
WHITE PAPER: This white paper describes how hackers use insecure keys and certificates to compromise a network and gives you tips on making yours more secure.
Posted: 09 Sep 2015 | Published: 09 Sep 2015


Is Your Organization Cyber Resilient?
sponsored by MASERGY
WHITE PAPER: This blog post introduces the World Economic Forum's Cyber-Resilience Framework and explains how it can help you find the points of strength and weakness in your organization's cybersecurity.
Posted: 16 Sep 2015 | Published: 13 Aug 2015


Control Security for the Whole Enterprise in One Place
sponsored by BitDefender
VIDEO: This video explains how employing a dedicated management portal for your endpoint security – whether physical, virtual or mobile – can help make your enterprise safer.
Posted: 07 Oct 2015 | Premiered: 19 Feb 2013


Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement