IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentReports
201 - 225 of 406 Matches Previous Page  | Next Page
How to tackle information classification
sponsored by ComputerWeekly.com
WHITE PAPER: The aim of this paper is to demonstrate how information classification can be used to enhance security within a Collaboration Oriented Architecture.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

How to tackle identity management and federated identity
sponsored by ComputerWeekly.com
WHITE PAPER: The majority of user authentication schemes today still use userid and password. The burden to users of managing large numbers of userids and passwords has led to proposals for Federated Identity systems, where a single set of credentials can be used to authenticate with several organisations, which have agreed to work together as a federation.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

How to establish end-point security
sponsored by ComputerWeekly.com
WHITE PAPER: The aim of this paper is to demonstrate how endpoint security status can be used to enable access within a Collaboration Oriented Architecture.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

How to tackle risk lifecycle management
sponsored by ComputerWeekly.com
WHITE PAPER: The Jericho Forum’s Collaboration Oriented Architectures (COA) enable enterprises that build COAcompliant architectures to operate in a secure and reliable manner.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to tackle trust management
sponsored by ComputerWeekly.com
WHITE PAPER: Trust, or the placing of it, is one of the key activities at the core of our human endeavours. The process of placing trust is simpler when the process is physical and proximal - that is when you can see, feel and touch that which you are about to trust.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to tackle trust management and business impact levels
sponsored by ComputerWeekly.com
WHITE PAPER: Back in the time when businesses were predominantly “local” and to a large extent insulated from each others operations, it really didn’t matter very much how we defined the Business Impact of Information Risks, for we knew what we meant in each business and we didn’t have much need to share that meaning with others.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to tackle encapsulation and encryption
sponsored by ComputerWeekly.com
WHITE PAPER: How you make a secure, trusted connection over the Internet is one of the key debates as the industry strives for de-perimeterised solutions that it can implement.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to tackle internet filtering and reporting
sponsored by ComputerWeekly.com
WHITE PAPER: In an environment where access to a secure computing device is governed and controlled by inherently secure protocols, the problem still remains of how access to untrusted environments such as the Web is controlled.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

Jericho Forum - the vision
sponsored by ComputerWeekly.com
WHITE PAPER: Jericho Forum aims to develop and influence information and communications technology(ICT) security standards.  These will facilitate the secure interoperation of ICT to support collaboration and commerce over open networks, within and between organisations, based on a security architecture and design approach entitled de-perimeterisation.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to manage data privacy
sponsored by ComputerWeekly.com
WHITE PAPER: Data privacy refers to the evolving relationship between technology and the legal right to, or public expectation of, privacy in the collection,  storing, management and sharing of data.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to create inherently secure communications
sponsored by ComputerWeekly.com
WHITE PAPER: In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

The 11 security commandments - Jericho Forum
sponsored by ComputerWeekly.com
WHITE PAPER: The Jericho Forum commandments define both the areas and the principles that must be observed when planning for a de-perimeterized future.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

E-Guide: Best practices for pen testing Web applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SearchSecurity.com

Computer Weekly - 31 January 2012: The importance of IT strategy
sponsored by ComputerWeekly.com
EZINE: In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now.
Posted: 30 Jan 2012 | Published: 31 Jan 2012

ComputerWeekly.com

The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER: In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension

Lumension Patch Management: Picking the Low-Hanging Fruit
sponsored by Lumension
WHITE PAPER: This white paper explores a centralized, comprehensive approach to application patching, allowing security pros to automatically detect risks, deploy patches and protect business information across a complex, highly distributed physical and virtual environment.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension

X-Force Mid-Year Trend Report
sponsored by IBM
ANALYST REPORT: This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Posted: 11 Jan 2012 | Published: 11 Jan 2012

IBM

Managing Risk in the Cloud
sponsored by NetApp
WHITE PAPER: This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks.
Posted: 05 Jan 2012 | Published: 01 Oct 2009

NetApp

Managing the Risk of Network Changes
sponsored by RedSeal Networks
WHITE PAPER: This paper discusses the challenges of change management and offers an effective 6-stage process for managing change. In addition, discover how RedSeal can improve the efficiency and effectiveness of each stage.
Posted: 14 Dec 2011 | Published: 14 Dec 2011

RedSeal Networks

Balancing compliance with information security threat assessment
sponsored by IBM
EGUIDE: This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.
Posted: 06 Dec 2011 | Published: 06 Dec 2011

IBM

E-Guide: Integrating security into the ALM lifecycle
sponsored by IBM
EGUIDE: In this expert e-guide, learn the risks businesses take by not taking application security measures seriously - and find out what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

IBM

Compliance and Risk Management: Factoring compliance as part of your risk management equation
sponsored by IBM
EBOOK: Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.
Posted: 14 Nov 2011 | Published: 14 Nov 2011

IBM

When Benefits Outweigh the Fears: Is Your Business Ready for the Cloud?
sponsored by Webroot
WHITE PAPER: Eric Johnson was a network admin at a small company of 50 or so workstations. One of the biggest problems he continuously faced was growing pains.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot

Risk and Compliance Outlook
sponsored by McAfee, Inc.
WHITE PAPER: Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

McAfee, Inc.

Real-Time Risk Monitoring
sponsored by Sybase, an SAP company
WHITE PAPER: Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Sybase, an SAP company
201 - 225 of 406 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement