Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed   
IT Risk Management White Papers (View All Report Types)
 
How to Prevent Data Breaches
sponsored by SkOUT
WHITE PAPER: How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

SkOUT

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

General Data Protection Regulation (GDPR): Balancing Risk and Corporate Reputation
sponsored by HID Global
WHITE PAPER: As the amount of breaches rise and the consequences for breaches get more expensive, it's imperative to keep anyone with malicious intent out of your company's networks and systems. In this white paper, learn how identity and access management technologies can keep your data secure and help your organization comply with the GDPR.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Secureworks Security Maturity Model
sponsored by Dell SecureWorks
WHITE PAPER: Learn how you can evaluate your organization's cybersecurity maturity based on its business operations and risk profile.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

Dell SecureWorks

Deconstructing the Risk of Public Cloud: 5 Use Cases
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 15 Aug 2019 | Published: 16 May 2019

Fortinet, Inc.

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning
sponsored by Cymulate
WHITE PAPER: Organizations of all shapes and sizes are fighting a war against threat actors. Currently, organizations use vulnerability scans and penetration tests to verify that their data is protected. However, a targeted attack simulation may be a better test for your organization. Download this white paper to learn more about targeted attack simulations.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Cymulate

The Present and Future of Security Operations
sponsored by Splunk
WHITE PAPER: In this white paper, learn about several technologies, processes, and philosophical trends that may help CISOs overcome today's security operations challenges and develop a well-organized and operative future-oriented strategy.
Posted: 20 May 2019 | Published: 31 Mar 2019

Splunk

Data Protection by Design
sponsored by Immuta, Inc
WHITE PAPER: Data Protection by Design (DPbD) is the core data protection requirement introduced by the GDPR. And yet despite DPbD's centrality to the GDPR, it receives scant attention. Why? It's quite difficult to implement because it consists of many different requirements. In this white paper, explore what the DPbD is and why it's central to the GDPR.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

Immuta, Inc

NIST Cybersecurity Framework
sponsored by One Identity
WHITE PAPER: This white paper provides an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Gaining a Strategic Endpoint Security Advantage in the Era of Advanced Threats
sponsored by Symantec
WHITE PAPER: Today's advanced threat landscape poses serious challenges for enterprises of any size. But the rising trend of attacks directed against midsized enterprises should bring security to the forefront of business planning for these organizations. In this report, learn how machine learning and AI can help in the fight against advanced threats.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Symantec
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement