IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 642 Matches Previous Page  |  Next Page
Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover in this expert white paper why piecemeal endpoint defenses are not are sufficient to protect against today's threat vectors—and think like an attacker to bolster your defenses. Read on to take 6 steps toward better security, including learning to redefine your perimeter, and more.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Learn from this exclusive white paper why you must add cyber-criminal motivation to your threat taxonomy, in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Data Breach Digest
sponsored by Verizon
WHITE PAPER: This report shines light on some of the most prevalent incident scenarios to show you what you can do in the face of disaster. Access now to learn how you can best mitigate threats in the future.
Posted: 05 May 2016 | Published: 01 Apr 2016

Verizon

Get Ahead of Our Next Security Breach
sponsored by Dell Software
WHITE PAPER: This white paper outlines five concrete steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

Strategies for Successfully Managing Privileged Accounts
sponsored by Dell Software
WHITE PAPER: This white paper shows you how to properly manage privileged accounts and offers a credential vault, audit capabilities and a suite of solutions for control of administrator access across your enterprise.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

How are today's CISO's transforming their security strategy?
sponsored by IBM
WHITE PAPER: This report outlines how CISOs are stepping up cybersecurity efforts to focus on addressing one of the most prevalent underlying issues globally - a programmatic focus on compliance instead of risk-based outcomes. Access now to learn what strategies security leaders are using to transform their organizations.
Posted: 05 May 2016 | Published: 01 Oct 2015

IBM

IBM X-Force Threat Intelligence Quarterly – Q4 2015
sponsored by IBM
WHITE PAPER: This report highlights four key trends that were observed throughout 2015, including an increase in "onion-layered" security incidents, ransomware attacks and insider threats. Access now to figure out how your organization can easily find the footprints attackers leave behind.
Posted: 05 May 2016 | Published: 31 Dec 2015

IBM

Advanced Hybrid Security: Flexible Solutions For Full Protection
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper teaches you about an advanced security architecture that allows you to flexibly augment your security posture so you can take down attacks before they interfere. Access now to prepare yourself for any attack originating on your network and targeting your assets.
Posted: 05 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: This white paper shows you how to protect your organization from email data breaches.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE: In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016

Prelert

Advanced security from the inside with VMware NSX
sponsored by VMware
WHITE PAPER: This white paper shows you a new way to implement data center security that constantly monitors threats while you're away. Now fine-grained threat isolation, segmentation and centralized control are all possible inside your data center. Access now to learn how you can gain fully streamlined operations and centralized control today.
Posted: 05 May 2016 | Published: 01 Apr 2016

VMware

Security Analysis: Mobile Dating Apps Vulnerabilities and Risks to Enterprises
sponsored by IBM
WHITE PAPER: This white paper shows you how to properly implement a BYOD policy and what to look out for, like dating apps on employee devices. Understand which applications are vulnerable to attacks and take action to blacklist at-risk applications from running on a device with corporate data.
Posted: 04 May 2016 | Published: 01 Feb 2015

IBM

4 Ways Data Loss Prevention Can Help Meet More Stringent HIPAA Enforcement
sponsored by Digital Guardian
WHITE PAPER: This white paper reviews specific HIPPA statues and how DLP helps your organization comply.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

Why Database Record Matching is the Most Effective Method for PHI Protection
sponsored by Digital Guardian
WHITE PAPER: This paper addresses health care organizations' responsibility for maintaining compliance with PHI regulations. Access now to learn the important role of Database Records Matching (DBRM) as the most effective and accurate method of identifying regulated PHI.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

This is How We Do It: A Financial Giant's Threat Intel Success Story
sponsored by ThreatConnect
WHITE PAPER: This white paper tells you the story of a Fortune 100 services organization that integrated its security infrastructure, increased the efficiency of its cybersecurity team, and thereby identified attacks before they occurred. Access now to learn how you can streamline and improve your threat intelligence program.
Posted: 04 May 2016 | Published: 01 Apr 2016

ThreatConnect

Securing Real-Time Mobile Communications
sponsored by Mitel Networks Limited
WHITE PAPER: This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.
Posted: 04 May 2016 | Published: 01 Apr 2016

Mitel Networks Limited

Digitization Drives the Need for Application Strengthening
sponsored by Ixia
WHITE PAPER: This white paper discusses the changing business landscape as it moves into the digital era. In this IT-driven era, competitive advantage is based on an organization's ability to be agile and adapt to changes as well as to make rapid shifts to capture market transitions.
Posted: 04 May 2016 | Published: 01 Apr 2016

Ixia

Proving Change in Business Critical Environments
sponsored by Ixia
WHITE PAPER: This white paper shows you how to properly test your product to meet the challenges you're responsible for. Learn how to test your project end-to-end to ensure your network can handle a new application rollout and to make sure protocols are handled properly to the lowest level.
Posted: 04 May 2016 | Published: 01 Mar 2016

Ixia

ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS
sponsored by Ipoque
WEBCAST: This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.
Posted: 04 May 2016 | Premiered: Apr 26, 2016

Ipoque

The Threat Landscape
sponsored by Kaspersky Lab
WHITE PAPER: Download the latest from Kaspersky Lab's security experts, and you will find updates on common vulnerabilities and exploits, Insights into the current state of threats and tips to improve employee security awareness.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Could Your Business Survive a Cryptor?
sponsored by Kaspersky Lab
WHITE PAPER: Learn how you can prevent such an attack and protect your business.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Debunking the Top 5 Security Implementation Myths
sponsored by Kaspersky Lab
WHITE PAPER: This e-book aims to show you that replacing your old cybersecurity can be quick and painless. Access now to learn 5 myths about implementing IT security.
Posted: 04 May 2016 | Published: 01 Dec 2015

Kaspersky Lab

Virtualization Security Options: Choose Wisely
sponsored by Kaspersky Lab
WHITE PAPER: This white paper describes different virtualization security solution options - conventional agent-based, agentless, and Light Agent. Access now to learn possible scenarios for aligning the right security approach to your organization's virtual environment.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

IBM Guardium: Database security tool overview
sponsored by IBM
EGUIDE: This e-guide shows you a proven security system that offers real-time, policy-based monitoring of database activities, including privileged user actions. Access now to learn how you can predefine security policies and put in place triggers alerts when sensitive data is accessed, and block if necessary.
Posted: 06 May 2016 | Published: 03 May 2016

IBM

Four enterprise scenarios for deploying database security tools
sponsored by IBM
EGUIDE: This e-guide shows you some classic use cases and how organizations are using security add-ons to boost database security. Learn the real benefits and challenges in selecting the right database security software to address the issues your organization faces.
Posted: 04 May 2016 | Published: 03 May 2016

IBM
1 - 25 of 642 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement