Environmental Safety

Environmental Safety Reports
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

The 10 Biggest and Boldest Insider Threat Incidents
sponsored by Proofpoint
WHITE PAPER: With more than 90% of successful cyberattacks requiring some level of human interaction, it’s never been more important to consider the potential of the insider threat. Explore this e-book to learn the 10 biggest and boldest insider threat incidents that have occurred in the last few years and discover how you can counter the next big one.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TOPICS:  Risk Management
Proofpoint

A Computer Weekly buyer’s guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

Billion Dollar Blindness
sponsored by TechTarget
WEBCAST: Access this webcast to learn how using the latest intent data and AI-driven technologies can transform their productivity and yields from a market, an ICP, or a set of named ABM accounts.
Posted: 26 Feb 2020 | Premiered: Feb 19, 2020

TechTarget

Attacking And Defending A Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 08 Feb 2021 | Published: 11 Nov 2020

ServiceNow

UKTech50 2021 - The most influential people in UK technology
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.
Posted: 08 Mar 2021 | Published: 08 Mar 2021

ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 19 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

Mainframe Security & Compliance
sponsored by BROADCOM, Inc
PODCAST: 80% of the world’s mission-critical data is stored on mainframes. Threat actors are always hunting this data, so enterprises must work to compliantly keep this data secure. But where do they start? Listen to this podcast to learn more about mainframe security and compliance and the challenges enterprises face in "securing the world".
Posted: 26 Mar 2021 | Premiered: Mar 26, 2021

BROADCOM, Inc

Business Continuity Management Continuity Planning, Disaster Recovery, Crisis Response
sponsored by ServiceNow
PRODUCT OVERVIEW: Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
Posted: 08 Feb 2021 | Published: 12 Nov 2020

ServiceNow

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella