IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
126 - 150 of 822 Matches Previous Page  |  Next Page
Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Take a Behavioral Bite Out of Crime
sponsored by Infor
WHITE PAPER: 44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Infor

Case Study: Proactively Protect and Secure the IT Environment
sponsored by LogicNow
CASE STUDY: Discover how Pearl Drums U.S. was able to get the antivirus, patch management, and automated monitoring they needed to keep their organization running efficiently. Learn how they gained insight into their network and now proactively protect and secure their IT environment with minimal IT resources.
Posted: 21 Jul 2016 | Published: 01 Jun 2016

LogicNow

See Why Network Monitoring Tools are Critical in today's Hyperconnected World
sponsored by eTECH Channel
EGUIDE: This e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.
Posted: 20 Jul 2016 | Published: 18 Jul 2016

eTECH Channel

The Security Survival Guide for Growing Businesses
sponsored by Trustwave
WHITE PAPER: This guide shows you step by step why your security may be suffering and offer practical tips for addressing critical points so you can take your data protection to the next level.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

Trustwave

Reference Guide: Acceptable Use Policy
sponsored by Navex Global
WHITE PAPER: This reference guide provides an example of an acceptable use policy of computer systems at an organization. Use this sample as a guideline for developing your own policy.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

Navex Global

6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team
sponsored by ThreatConnect
WHITE PAPER: This paper outlines 6 steps you can take to prioritize threat data, automate manual tasks, and streamline your workflow. With the right tools in place, you can turn your small band of brothers into an army suited to take down all of today's sophisticated threats.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

IT Security for Retail
sponsored by Trustwave
WHITE PAPER: This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader
sponsored by Digital Guardian
WHITE PAPER: The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Digital Guardian

IT Security for Financial Sector
sponsored by Trustwave
WHITE PAPER: Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next $50 million mistake.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

ExtraBlu: Checking Flash Content to see if it is from a malicious source using ExtraHop and OctoBlu
sponsored by ExtraHop
ANALYST REPORT: Learn how to gain greater visibility as well as access to automatic workflows that can be used to corral infected systems and decrease exposure. Discover how to audit access to all files and ensure they don't come from malicious sources.
Posted: 15 Jul 2016 | Published: 28 Jun 2016

ExtraHop

3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat

Migration Best Practices for Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: As IT systems age, they become more brittle. Download this white paper to understand the benefits of adopting the latest release of Red Hat Enterprise Linux—which will mitigate risk in the lifecycle of your server platform, and decrease the vulnerability of systems to security threats.
Posted: 15 Jul 2016 | Published: 29 Aug 2014

Red Hat

Ransomware: Profitable for Criminals, Hard to Stop for Enterprises
sponsored by ExtraHop
ANALYST REPORT: Can your traditional approaches to security keep up with the bad guys? Learn a more behavior-based approach to detecting ransomware. Discover how this security strategy can grant you better visibility into your environment so you can determine where malware is and where it's been.
Posted: 14 Jul 2016 | Published: 15 Jun 2016

ExtraHop

4 Cybersecurity Trends that Might Be Affecting Your Organization
sponsored by Navex Global
ANALYST REPORT: In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.
Posted: 13 Jul 2016 | Published: 04 May 2016

Navex Global

Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE: In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016

Check Point Software Technologies Ltd.

Major Global Bank Secures Their Mobile Applications
sponsored by Arxan
CASE STUDY: Learn how a major global banking leader was able to pave the way for mobile banking security to protect critical cryptography and authentication routines in their app that manages communication with the banking server.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Arxan

Stop Future Threats though Careful Examination of the Malware Lifecycle
sponsored by Check Point Software Technologies Ltd.
EGUIDE: This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
Posted: 11 Jul 2016 | Published: 08 Jul 2016

Check Point Software Technologies Ltd.

Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Dell SecureWorks

HIPAA Compliance & Risk Management
sponsored by Armor
WHITE PAPER: Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.
Posted: 11 Jul 2016 | Published: 31 Dec 2015

Armor

4 Steps to Effectively Managing Risk and Compliance for Financial Services
sponsored by IBM
WHITE PAPER: Learn why convergence is key to maximizing governance efforts, and discover the 4 steps financial services organizations can take to mitigate compliance risks.
Posted: 22 Jul 2016 | Published: 31 May 2011

IBM

BYOD and mHealth: Navigating Security and HIPAA
sponsored by Optum
EGUIDE: BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.
Posted: 14 Jul 2016 | Published: 13 Jul 2016

Optum

Security Tips for HIPAA-Compliant Cloud Storage and Texting
sponsored by Optum
EGUIDE: Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
Posted: 13 Jul 2016 | Published: 12 Jul 2016

Optum
126 - 150 of 822 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement