Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed   
Business Risk Analysis Reports
 
Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

The Future of Model Risk Management for Financial Services Firms
sponsored by SAS
WHITE PAPER: In this white paper, discover how model risk management (MRM) groups are helping banks keep up with evolving regulations, and uncover the 5 essential features of successful MRM. To plan for the future of MRM, download this white paper today, and learn more about the technology fueling your MRM journey.
Posted: 19 Mar 2019 | Published: 31 Dec 2016

SAS

Cybersecurity Benchmarking & Security Performance Management
sponsored by BitSight
WHITE PAPER: A new, data-driven security performance management approach is required to maintain security, minimize risk, and reduce costs. The key component of this new data-driven approach is the security rating. In this white paper, explore how the approach can be applied to security performance management, benchmarking and reporting.
Posted: 22 May 2019 | Published: 22 May 2019

BitSight

General Data Protection Regulation (GDPR): Balancing Risk and Corporate Reputation
sponsored by HID Global
WHITE PAPER: As the amount of breaches rise and the consequences for breaches get more expensive, it's imperative to keep anyone with malicious intent out of your company's networks and systems. In this white paper, learn how identity and access management technologies can keep your data secure and help your organization comply with the GDPR.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Industry Cyber Exposure Report
sponsored by Rapid7
RESEARCH CONTENT: Measuring the cost and concentration of weaknesses in the public-facing configuration of internet-connected services is increasingly important in the face of growing cybersecurity threats. In this research report, explore Rapid7 Lab's key findings as they measured the current levels of exposure and resiliency in 453 of the 2017 Fortune 500 list.
Posted: 04 Apr 2019 | Published: 11 Dec 2018

Rapid7

Securing the Critical Industrial Infrastructure
sponsored by Splunk
WHITE PAPER: Awareness of the impact of a breach in the ICS (Industrial Control Systems) and OT (operational technology) environment has risen considerably. Threats to ICS could have severe impacts on the business and reputation of an organization. In this white paper, learn how cyberattacks are affecting both IT and OT networks, including the risks involved.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk

7 SIEM Trends to Watch in 2019
sponsored by Splunk
WHITE PAPER: In recent years, SIEM solutions have become more of an information platform, with enterprise demands for better security driving much of the SIEM market. In this white paper, explore 7 SIEM trends to watch in 2019.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

Splunk

Case Study: New York Cruise Lines & Armor Cloud Security
sponsored by Armor
CASE STUDY: The New York Cruise Lines wanted to ensure they provided guests with online resources. However, with every new web-facing resource, there's an increased risk of a data breach. In this case study, learn how the New York Cruise Lines were able to secure their hybrid cloud infrastructure by implementing Armor's managed security provider.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Armor

Basics (and Beyond) of Patch Management
sponsored by ConnectWise
EBOOK: With new vulnerabilities being discovered almost daily, keeping systems up-to-date with patches is often a full-time job, especially in larger environments. In this eBook, learn about the 6 step patch management process for reconciling the deployment state of an operating system and third party software updates.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

ConnectWise

Cybersecurity Incident Response Services
sponsored by CrowdStrike
RESEARCH CONTENT: According to Forrester Analytics 2018 survey data, 50% of global security decision makers reported suffering at least one breach in the past 12 months. Pragmatic businesses plan for a breach. In this Forrester Wave report, explore key criteria to look for when evaluating a cybersecurity incident response service provider.
Posted: 09 May 2019 | Published: 18 Mar 2019

CrowdStrike
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement