Business of Information Technology  >   Business Management  >   Project Management  >  

Enterprise Program Management

RSS Feed   
Enterprise Program Management Reports
 
Innovation in retail: Using cybersecurity as a competitive advantage
sponsored by Capgemini
RESOURCE: While cybersecurity measures enable retail organizations to identify and mitigate potential threats, it’s important to consider that data protection can be considered a competitive advantage. In this blog post, explore the importance of security for retail consumers, how GDPR is shaping the industry, and the role of SOCs in quantifying risks.
Posted: 19 Dec 2019 | Published: 13 May 2019

Capgemini

Thales Data Protection on Demand
sponsored by Thales
CASE STUDY: In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Thales

Machine-Learning Automation to Ensure Zero Time to Mitigation
sponsored by Radware
WHITE PAPER: DDoS attack methods are evolving, and traditional protection solutions are ineffective at mitigating the damage dealt by these campaigns. This whitepaper highlights how combining machine learning with existing DDoS prevention tactics can ensure zero-time to mitigation. Read on to learn more.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Radware

CISSP Has Changed (Again): What it Means for Your Certification Prep
sponsored by Global Knowledge
WHITE PAPER: In April 2018, the CISSP (Certified Information Systems Security Professional) exam was updated with changes to the topics covered and format of the test. In this study guide, overview the revisions to the exam and uncover some tips and tricks to passing the exam. Read on to get started with your CISSP preparation.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

Global Knowledge

Emerging Technology Analysis: SOAR Solutions
sponsored by ThreatQuotient
WHITE PAPER: Although SOAR and SIEM share similar security capabilities, they are distinct markets unlikely to consolidate. However, technology leaders at SOAR providers need to understand this distinction in order to build upon existing SIEM services. This deep dive from Gartner focuses on SOAR and offers recommendations for SOAR providers.
Posted: 22 Jan 2020 | Published: 07 Dec 2018

ThreatQuotient

How to Build Out Your Cybersecurity Technology Stack
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: For organizations beginning their journey towards establishing a cybersecurity program, there can be an overwhelming number of vendors to choose from. This white paper is designed to guide organizations as they begin their selection process by providing advice for what to look for when evaluating vendors and service providers.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Arctic Wolf Networks, Inc.

Iranian Threat Groups and Campaigns
sponsored by IronNet
WHITE PAPER: In a recent study, cybersecurity experts studied leading cyberthreat groups across Iran in order to provide a comprehensive report summarizing documented campaigns, common target & actor types, and geographic trends in attack patterns – all in order to help organizations be better prepared in the event of an attack.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

IronNet

The Economics of Cybersecurity: Preparing for Ransomware
sponsored by BlueVoyant
EBOOK: One of the most recent evolutions of malware is ransomware, and it’s not going anywhere. In fact, it’s grown to the point where businesses need to consider it an inevitability and prepare accordingly. This e-book is designed to help you identify the cybersecurity costs needed for building a proactive defense strategy. Read on to learn more.
Posted: 12 May 2020 | Published: 12 May 2020

BlueVoyant

Security Governance: Building a Framework and Establishing Trust
sponsored by RSA Conference
WEBCAST: Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged presentation, see how Kuwait’s oil and gas companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.
Posted: 22 Jan 2020 | Premiered: Oct 10, 2019

RSA Conference

Proofpoint Security Awareness Training
sponsored by Proofpoint
DATA SHEET: While security tools allow organizations to detect and block malicious emails, one of the most effective ways to address modern cyberattacks is to train your employees in threat detection. However, it can be difficult to develop a training program. Read on to learn more about Proofpoint’s Security Awareness Training program.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info