Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed   
Business Risk Analysis Reports
 
Winning the Battle Over Passwords
sponsored by OneLogin
WHITE PAPER: Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

OneLogin

Enterprise Collaboration: Benefits, Misalignment's, and Risks
sponsored by Adobe Inc
WHITE PAPER: In this white paper, learn how to address common enterprise collaboration and digital transformation challenges by addressing corresponding data privacy, data security, and regulatory compliance obstacles. Additionally discover how collaboration initiatives can help your organization accelerate decision-making, increase productivity, and more.
Posted: 13 Jun 2019 | Published: 30 Jun 2018

Adobe Inc

ThreatQ for Critical Infrastructure
sponsored by ThreatQuotient
RESOURCE: Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

ThreatQuotient

Continuous Risk Monitoring for Vulnerabilities
sponsored by ServiceNow
PRODUCT DEMO: In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.
Posted: 05 Feb 2020 | Premiered: 04 Dec 2019

ServiceNow

Combining GRC programs with BC and DR
sponsored by ServiceNow
EGUIDE: In this e-guide, explore the tools used for gathering critical data and discover why Governance, risk management and compliance (GRC) and Business continuity (BC) teams should collaborate to concentrate their efforts in order to build a comprehensive data privacy program.
Posted: 25 Nov 2019 | Published: 15 Nov 2019

ServiceNow

The Total Economic Impact Of Alert Logic SIEMless Threat Management
sponsored by Alert Logic
RESEARCH CONTENT: Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.
Posted: 14 Jun 2019 | Published: 31 May 2019

Alert Logic

5 Steps to Minimize Your Exposure to Ransomware Attacks
sponsored by Centrify Corporation
WEBCAST: According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Agile Data Governance: A Bottom-Up Approach
sponsored by Alation
WEBCAST: In this webinar with Malcolm Chisholm of First San Francisco Partners, and Aaron Kalb of Alation, learn best practices for implementing agile data governance and how a data catalog can support these initiatives.
Posted: 28 Aug 2019 | Premiered: Nov 27, 2018

Alation

CyberArk for Dummies: Privileged Access Security
sponsored by CyberArk Software, Inc
EBOOK: The key to most companies' crown jewels is through privileged access, whether a privileged account, credential, or secret. So if protecting privileged access is so critical, why aren't companies doing more to guard against these types of attacks? In this e-book, learn everything you need to know about protecting privileged access.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

CyberArk Software, Inc

This is the #1 Threat to Your Digital Properties
sponsored by The Media Trust
WHITE PAPER: In the early days of the Web and e-commerce, CISOs could secure the web application code developed by internal teams. But now, the majority of a website's code relies on third-parties. In this white paper, learn what CISOs need to know in order to protect themselves and their digital properties from malicious third-party code.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

The Media Trust
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info