Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk Reports
Ten Top Tips on Keeping Your Business Secure
sponsored by Sage (UK) Limited
WHITE PAPER: From incident response to user education, this white paper lists the top ten steps you need to take to keep your business secure.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Sage (UK) Limited

Case Study: How a Major Media Organization Fought off Hacktivists
sponsored by Akamai
WHITE PAPER: This case study tells how a major media company took steps to successfully keep hacktivists at bay and maintain uptime across 19 digital properties.
Posted: 09 Nov 2015 | Published: 09 Nov 2015


Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform
sponsored by Qualys
WHITE PAPER: This white paper discusses how you can use vulnerability scanners to set priorities and ensure that the most valuable aspects of your enterprise network are always secure.
Posted: 15 Oct 2015 | Published: 15 May 2012


Best Practices for Strong Cyber Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.
Posted: 20 Nov 2015 | Published: 30 Sep 2015

Hewlett Packard Enterprise

Special Report: Threat Intelligence in Late 2015
sponsored by IBM
WHITE PAPER: This quarterly threat intelligence reveals the newest developments in cybercrime, helping you to stay secure against today's most dangerous threats.
Posted: 13 Oct 2015 | Published: 31 Aug 2015


State of Security Operations: The 2015 Report on Cyber Defense Maturity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report brings you the latest information on the capabilities of today's security operations centers and how they need to improve.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Hewlett Packard Enterprise

Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Between Defense and Recovery: The Growing Trend Toward Mitigation
sponsored by Unisys
RESOURCE: This resource will help you gain an understanding of what a successful defense against cyber-attacks entails. Learn how a mitigation strategy can stop security threats from doing real harm, even once inside your system.
Posted: 05 Nov 2015 | Published: 14 Jul 2015


From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


How to Provide Secure Application Access and Improve Network Performance
sponsored by Palo Alto Networks
CASE STUDY: In this case study, learn how the University of Adelaide transformed their non-scalable network security system by deploying next-generation firewall technology, offering granular visibility of threats and better control of Internet applications.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Palo Alto Networks
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement