IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed   
Assessing Risk Reports
 
3 Steps to Managing Shadow IT
sponsored by Cisco Umbrella
WHITE PAPER: In today's digital workplace, organizations, departments, and individual users are embracing the cloud and leveraging new apps at rapid speed. This makes it difficult for security leaders to track app use and ensure that proper protections are in place. In this white paper, uncover 3 steps to managing shadow IT.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

Software & Cloud Lifecycle Management Transformation
sponsored by Livingstone Group
EBOOK: What does a software and cloud lifecycle management transition look like? Dive inside this quick blueprint to step through a software and cloud lifecycle management workshop of your own, revealing the lifecycle challenges your own organization might be grappling with — sometimes without even knowing — and pointing towards the answers of best fit.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Livingstone Group

Focus: Securing for the future
sponsored by ComputerWeekly.com
EGUIDE: 2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

ComputerWeekly.com

10-Step Executive Action Plan for Collective Defense
sponsored by IronNet
EBOOK: A collective approach may be beneficial to organizations searching for security advantages.Indeed, a heightened security posture often begins and ends with collaboration. In this e-book, read more about how a combination of organizational preparedness and advanced technology can aid in defending against threats.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

IronNet

Gartner Magic Quadrant for IT Risk Management
sponsored by ServiceNow
RESOURCE: IT risk management (ITRM) has emerged as a key pillar in assessing risk, bolstering security and addressing compliance needs. Read this Gartner Magic Quadrant Report for an in-depth comparison of the capabilities of top ITRM vendors and offerings in today’s market.
Posted: 09 Oct 2020 | Published: 11 Aug 2020

ServiceNow

Improve Security And Compliance
sponsored by Red Hat and Intel
EBOOK: Speed and response time are essential in reducing the impact of data breaches – in fact, containing a breach within 200 days or less reduced the overall cost of a breach by more than 50% in 2020. Read this e-book to learn more about how to improve security, reduce risk and ensure compliance.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Red Hat and Intel

Three Tenets of Security Protection for State and Local Government and Education (SLED)
sponsored by Dell Technologies
RESOURCE: Security is the utmost priority for IT decision-makers in government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data. In this resource, explore important factors to consider when incorporating security into IT modernization initiatives.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Dell Technologies

Fighting Hackers & Responding to Ransomware: A How-To
sponsored by Fidelis
EGUIDE: Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.
Posted: 20 Jan 2021 | Published: 15 Jan 2021

Fidelis

Methods for Preventing Hospital Ransomware Infections and Cyberattacks
sponsored by Cisco Umbrella
EGUIDE: The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.
Posted: 06 Feb 2017 | Published: 02 Feb 2017

Cisco Umbrella

See Why Network Monitoring Tools are Critical in today's Hyperconnected World
sponsored by eTECH Channel
EGUIDE: This e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.
Posted: 20 Jul 2016 | Published: 18 Jul 2016

eTECH Channel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences