Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Safety

RSS Feed   
Environmental Safety Reports
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance
sponsored by HackerOne
CASE STUDY: Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.
Posted: 14 Jun 2019 | Published: 14 Jun 2019


Cybersecurity Incident Response Services
sponsored by CrowdStrike
RESEARCH CONTENT: According to Forrester Analytics 2018 survey data, 50% of global security decision makers reported suffering at least one breach in the past 12 months. Pragmatic businesses plan for a breach. In this Forrester Wave report, explore key criteria to look for when evaluating a cybersecurity incident response service provider.
Posted: 09 May 2019 | Published: 18 Mar 2019


4 Questions to Ask E-Signature Vendors About Security to Empower Digital Transformation
sponsored by Adobe Systems Incorporated
RESOURCE: In this article, discover key questions to ask your potential e-signature vendor about product security, and review your e-signature software options with Adobe.
Posted: 09 May 2019 | Published: 09 May 2019

Adobe Systems Incorporated

Governance, Risk, and Compliance: Analyst Report
sponsored by ServiceNow
ANALYST REPORT: In this Forrester Total Economic Impact report, discover a framework to evaluate the potential financial impact of ServiceNow GRC on your organization.
Posted: 24 May 2019 | Published: 24 May 2019


Maturing a Threat Intelligence Program
sponsored by ThreatConnect
WHITE PAPER: In order to fully harness the power of threat intelligence, your organization must make the case for an intelligence-driven security approach and identify the right people to staff the program. In this white paper, explore how ThreatConnect's Threat Intelligence Maturity Model can help you better apply threat intelligence at your organization.
Posted: 01 May 2019 | Published: 01 May 2019


How to Strengthen Your Vendor Risk Management Strategy Through Automation
sponsored by BitSight
RESOURCE: To reduce third-party cyber-risk organizations need processes and solutions that leverage automation. In this resource, Stephen Boyer, CTO of BitSight, explains how organizations can incorporate automation to develop more mature vendor risk management programs.
Posted: 23 May 2019 | Published: 23 May 2019


The Zenefits Bug Bounty Story
sponsored by HackerOne
CASE STUDY: Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.
Posted: 14 Jun 2019 | Published: 14 Jun 2019


Is Your Data As Protected As It Should Be?
sponsored by ECi
WHITE PAPER: In this white paper, discover how to create and implement an improved data protection strategy with cloud computing. Explore the benefits of cloud computing in data protection, and decide if cloud computing is right for your organization.
Posted: 13 Jun 2019 | Published: 13 Jun 2019


Resource Planning Software vs Microsoft Excel
sponsored by Capita Retain International
VIDEO: In this brief video, learn how Retain International's resource planning software compares to Microsoft Excel.
Posted: 17 Jun 2019 | Premiered: 02 Nov 2018

Capita Retain International

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement