Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed   
IT Risk Management Reports
 
Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization
sponsored by FairWarning
EBOOK: 1 in 3 data breaches involve internal actors, according to the Verizon Data Breach Investigation Report 2019. There are many different insider threat profiles that have varying intentions. In this ebook, explore 5 of these profiles and learn how to protect your organization from each.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

FairWarning

State of the Web Report 2019
sponsored by Tala Security
ANALYST REPORT: The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Tala Security

New Topics on the New Security+ SY0-501 Exam
sponsored by Global Knowledge
WHITE PAPER: In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Global Knowledge

CCPA legislation overview: Everything you need to know to prepare
sponsored by TechTarget
RESOURCE: The deadline for CCPA is rapidly approaching. With just a few months left to finalize your consumer data protection strategy, it's critical to take a step back and ensure your approach doesn't have any gaps. Our CCPA guidebook equips you with knowledge to better understand the legislation. Complete our survey to reserve your free copy.
Posted: 04 Feb 2020 | Published: 28 Mar 2020

TOPICS:  Risk Management
TechTarget

Security Awareness Training Done Right
sponsored by Mimecast
PRODUCT OVERVIEW: Despite the most advanced protections that can be put in place, despite the best threat intelligence that can be brought, organizations remain vulnerable to attacks because of one key factor: human error. In this solution brief, learn how Mimecast Awareness Training can help organizations combat security breaches caused by employee mistakes.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

10 Cybersecurity Steps You Can Start on Today
sponsored by Crosskey Cyber Security
RESOURCE: As a business leader in a small or medium sized high-risk business, you are overwhelmed by many things. And threats and regulatory requirements keep multiplying. In this blog post, explore a list of 10 cybersecurity steps you can start on today.
Posted: 06 Mar 2020 | Published: 06 Mar 2020

Crosskey Cyber Security

Keeping Fraud Detection Software Aligned With the Latest Threats
sponsored by SAS
WHITE PAPER: Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.
Posted: 21 Oct 2019 | Published: 22 Oct 2019

ComputerWeekly.com

Advanced Data Protection for Midsize Enterprises
sponsored by InteliSecure
WHITE PAPER: Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

InteliSecure

Threats of Surveillance Tools: Spyware and Stalkerware
sponsored by RSA Conference
PODCAST: Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.
Posted: 21 Jan 2020 | Premiered: Dec 16, 2019

RSA Conference
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info