Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed   
Enterprise Risk Management Reports
 
DreamWorks Animation Applies HP Inc.'s Expertise and Experience to Reinforce Print and Document Security
sponsored by HP
CASE STUDY: In this case study, learn how a large film production studio, DreamWorks Animation, partnered with HP Inc. to address its print security needs. The case study also provides recommendations for addressing your organization's printer security needs.
Posted: 13 Mar 2019 | Published: 31 Mar 2018

HP

Evolving Security Drivers in the UK Public Sector
sponsored by Kyocera Document Solutions UK
RESOURCE: There is an increased appetite for more secure print and document management processes. Even public sector organizations with a good grasp of the security challenges facing their print estates have a hard time knowing how secure each device is. In this article, learn how KYOCERA's Secure MFP can help mitigate the risks of threats and attacks.
Posted: 21 Mar 2019 | Published: 06 Apr 2018

Kyocera Document Solutions UK

Asset Management for Cybersecurity: 10 Essential Questions to Answer
sponsored by Axonius
WHITE PAPER: When Axonius built their cybersecurity asset management platform, they had conversations with hundreds of security professionals about the challenges they face around seeing and securing all assets. In this post, they cover the 10 most common questions they heard, why they are difficult to answer, and how to overcome the obstacles.
Posted: 23 Jan 2019 | Published: 23 Jan 2019

Axonius

The Beginner's Guide to Mitigating Phishing Attacks
sponsored by DomainTools
WEBCAST: Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018
sponsored by Security Scorecard
RESEARCH CONTENT: According to Forrester's survey, only 14% of respondents are confident that they effectively track all of their third parties. Cybersecurity risk rating solutions can help by automating the collection and analysis of third-party risk data. In this report, Forrester identifies the 9 most significant cybersecurity risk rating solution providers.
Posted: 11 Feb 2019 | Published: 13 Nov 2018

Security Scorecard

Integrated Security Analytics
sponsored by Forcepoint
WHITE PAPER: Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise makes the task of identifying genuine data theft risks challenging, even for well-resourced security operations teams. In this white paper, read about Forcepoint's integrated security analytics system.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

Forcepoint

SANS 2018 Threat Hunting Survey Results
sponsored by DomainTools
WHITE PAPER: Threat hunting is a focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defender's networks. Threat hunting is a hypothesis-driven approach to validating the collection, detection and analysis of data ahead of an incident. In this white paper, learn about all things threat hunting.
Posted: 11 Jan 2019 | Published: 30 Sep 2018

DomainTools

Combat Money Laundering with In-Database Analytics
sponsored by Onfido
EGUIDE: Money laundering was back at the top of the agenda recently when on June 26th 2017, the European Union's Fourth Anti-Money Laundering Direct came into force. One way to detect money laundering activities is by using in-database analytics. In this e-guide, discover 4 factors that contribute to compliance failure in anti-money laundering.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Onfido

Fraud Prevention
sponsored by Riskified
WHITE PAPER: For online retailers, CNP fraud is a serious problem that will only get larger as the eCommerce market continues to grow. Despite this harsh reality, senior management isn't giving this issue the attention that it deserves. In this white paper, learn about the value of fraud management operations.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Riskified
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement