IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentReports
226 - 250 of 425 Matches Previous Page  | Next Page
How to tackle information classification
sponsored by ComputerWeekly.com
WHITE PAPER: The aim of this paper is to demonstrate how information classification can be used to enhance security within a Collaboration Oriented Architecture.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

How to tackle identity management and federated identity
sponsored by ComputerWeekly.com
WHITE PAPER: The majority of user authentication schemes today still use userid and password. The burden to users of managing large numbers of userids and passwords has led to proposals for Federated Identity systems, where a single set of credentials can be used to authenticate with several organisations, which have agreed to work together as a federation.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

How to establish end-point security
sponsored by ComputerWeekly.com
WHITE PAPER: The aim of this paper is to demonstrate how endpoint security status can be used to enable access within a Collaboration Oriented Architecture.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

How to tackle risk lifecycle management
sponsored by ComputerWeekly.com
WHITE PAPER: The Jericho Forum’s Collaboration Oriented Architectures (COA) enable enterprises that build COAcompliant architectures to operate in a secure and reliable manner.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to tackle trust management
sponsored by ComputerWeekly.com
WHITE PAPER: Trust, or the placing of it, is one of the key activities at the core of our human endeavours. The process of placing trust is simpler when the process is physical and proximal - that is when you can see, feel and touch that which you are about to trust.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to tackle trust management and business impact levels
sponsored by ComputerWeekly.com
WHITE PAPER: Back in the time when businesses were predominantly “local” and to a large extent insulated from each others operations, it really didn’t matter very much how we defined the Business Impact of Information Risks, for we knew what we meant in each business and we didn’t have much need to share that meaning with others.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to tackle encapsulation and encryption
sponsored by ComputerWeekly.com
WHITE PAPER: How you make a secure, trusted connection over the Internet is one of the key debates as the industry strives for de-perimeterised solutions that it can implement.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to tackle internet filtering and reporting
sponsored by ComputerWeekly.com
WHITE PAPER: In an environment where access to a secure computing device is governed and controlled by inherently secure protocols, the problem still remains of how access to untrusted environments such as the Web is controlled.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

Jericho Forum - the vision
sponsored by ComputerWeekly.com
WHITE PAPER: Jericho Forum aims to develop and influence information and communications technology(ICT) security standards.  These will facilitate the secure interoperation of ICT to support collaboration and commerce over open networks, within and between organisations, based on a security architecture and design approach entitled de-perimeterisation.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to manage data privacy
sponsored by ComputerWeekly.com
WHITE PAPER: Data privacy refers to the evolving relationship between technology and the legal right to, or public expectation of, privacy in the collection,  storing, management and sharing of data.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to create inherently secure communications
sponsored by ComputerWeekly.com
WHITE PAPER: In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

The 11 security commandments - Jericho Forum
sponsored by ComputerWeekly.com
WHITE PAPER: The Jericho Forum commandments define both the areas and the principles that must be observed when planning for a de-perimeterized future.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

E-Guide: Best practices for pen testing Web applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SearchSecurity.com

How to handle requirements for risk assessment methodologies
sponsored by ComputerWeekly.com
WHITE PAPER: Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization.
Posted: 24 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

How to tackle risk taxonomy
sponsored by ComputerWeekly.com
WHITE PAPER: This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available.
Posted: 24 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

Remediating IT vulnerabilities: Quick hits for risk prioritization
sponsored by SearchSecurity.com
EGUIDE: There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

SearchSecurity.com

Balancing compliance with information security threat assessment
sponsored by IBM
EGUIDE: This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.
Posted: 06 Dec 2011 | Published: 06 Dec 2011

IBM

E-Guide: Integrating security into the ALM lifecycle
sponsored by IBM
EGUIDE: In this expert e-guide, learn the risks businesses take by not taking application security measures seriously - and find out what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

IBM

Compliance and Risk Management: Factoring compliance as part of your risk management equation
sponsored by IBM
EBOOK: Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.
Posted: 14 Nov 2011 | Published: 14 Nov 2011

IBM

When Benefits Outweigh the Fears: Is Your Business Ready for the Cloud?
sponsored by Webroot
WHITE PAPER: Eric Johnson was a network admin at a small company of 50 or so workstations. One of the biggest problems he continuously faced was growing pains.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot

Risk and Compliance Outlook
sponsored by McAfee, Inc.
WHITE PAPER: Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

McAfee, Inc.

Real-Time Risk Monitoring
sponsored by Sybase, an SAP company
WHITE PAPER: Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Sybase, an SAP company

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2
sponsored by IBM
EGUIDE: This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
Posted: 20 Sep 2011 | Published: 20 Sep 2011

IBM

Delivering high quality applications faster with reduced risk & cost
sponsored by IBM
WHITE PAPER: Improve time to value and quality by reducing rework and cost through faster stakeholder consensus, increased productivity, better process automation, and anytime-anywhere decision support for application software. Download the paper for more information on delivering high quality applications faster with reduced risk & cost.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program
sponsored by IBM
EGUIDE: This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM
226 - 250 of 425 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement