IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed   
Assessing Risk Reports
 
Optiv's Managed Security Services Mitigate Risk for Multi-Brand National Retailer
sponsored by Optiv
CASE STUDY: A leading multi-brand national retailer needed to maintain evolving security demands. Learn how Optiv's Managed Security Services (MSS) was able to provide them critical 24x7x365 remote access and infrastructure needed to maximize costs and resources.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Optiv

Penetration Testing: Protect Critical Assets Using an Attacker’s Mindset
sponsored by IBM
WHITE PAPER: The proliferation of financial losses and brand damage stemming from security breaches means organizations need to be proactive in protecting their most valued assets. In this white paper, learn how IBM X-Force Red penetration testing services can help your organization identify and fix critical vulnerabilities before criminals exploit them.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

IBM

The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

Hype Cycle for Privacy, 2019
sponsored by TITUS
ANALYST REPORT: Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.
Posted: 11 Sep 2019 | Published: 11 Jul 2019

TITUS

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

OneLogin

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

The SIEM Buyer's Guide for 2020
sponsored by Splunk
WHITE PAPER: The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

Utility Regulations Demand Robust Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

BitSight

Security Visibility for Cloud Environments: Webinar
sponsored by CloudPassage
WEBCAST: In this webcast, cybersecurity experts Carson Sweet, CloudPassage CEO and founder, and Holger Schulze, Cybersecurity Insiders CEO and founder, will discuss technical factors and operational approaches for successfully achieving continuous, automated risk visibility when adopting public cloud infrastructure.
Posted: 19 Sep 2019 | Premiered: Sep 19, 2019

CloudPassage

Quantifying the Operational and Security Results of Switching to Forcepoint NGFW
sponsored by Forcepoint
RESEARCH CONTENT: The distributed nature of many organizations and the changing nature and scale of threats are creating new pressures related to network security. In this IDC study, learn how Forcepoint Next Generation Firewall can serve as a core component of organizations' efforts to protect their networks against common threats.
Posted: 10 Jun 2019 | Published: 31 May 2017

Forcepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement