Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Health

RSS Feed   
Environmental Health Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Using Risk Management strategies to help us effectively Socially Distance
sponsored by Ostendio
RESOURCE: When it comes to COVID-19, risk cannot be eliminated, but it can certainly be minimized. This is the case for both managing organizational and personal risk. View this article from Ostendio to learn about steps your organization can take to help minimize and manage risk.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Ostendio

HOW TO COMBAT Ransomware
sponsored by VMware International Unlimited Company
WHITE PAPER: Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.
Posted: 15 May 2020 | Published: 15 May 2020

VMware International Unlimited Company

Security Advisory: Is Your Enterprise Data Being "Phoned Home"?
sponsored by ExtraHop
WHITE PAPER: Organizations give too little thought towards how their data is being used by the third-party vendors they partner with. Unfortunately, there are growing instances of data misuse. This white paper highlights 4 examples and shares best practices for ensuring data security, privacy and compliance.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

ExtraHop

Top 10 startup stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: A persistent theme in this year's Computer Weekly startup coverage was collaboration, but this time with a particular emphasis on building ecosystems. Across Europe, startups have been pushing to build collaborative ecosystems in both the public and private sector alongside their partners. Here are Computer Weekly's top 10 startup stories of 2019.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

ComputerWeekly.com

Machine Learning Applications for Banking Fraud Detection
sponsored by Dataiku
EGUIDE: AI-based systems can augment regulatory alert systems and improve analysts’ workflow by reducing noise without discarding results. Access this paper to view the 3 types of anomalies to look out for, understand examples of how banks use fraud and anomaly detection, and learn how to build a basic, machine learning-based fraud detection system.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Dataiku

Vulnerability Management 2020 Navigating to New Heights
sponsored by Vulcan
WHITE PAPER: Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.
Posted: 20 May 2020 | Published: 31 Dec 2019

Vulcan

Benefits of Digital Transformation for Oil and Gas Companies
sponsored by TIBCO
WHITE PAPER: A recent IDC Analyst Infobrief outlined 6 specific challenges in making sense of oil and gas companies’ data that posed the greatest concern. Access this white paper to view these challenges and to gain exposure to 3 use cases that reveal how analytics can help you outcompete your peers in the oil and gas industries.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

TIBCO

HTTP Security Headers Guidelines: An Informative Tutorial
sponsored by TechTarget
RESOURCE: In our exclusive expert guide, Who, What & How of HTTP Security Headers, Judith Myerson outlines how to defend your websites using strong HTTP security headers. To claim your free PDF download, participate in our market research program.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget

False cents of security: The price of being compromised
sponsored by ComputerWeekly.com
EGUIDE: Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 02 Jun 2020 | Published: 03 Jun 2020

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info