Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed   
Loss Management Reports
 
The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

How Do You Cultivate Compliance to Protect Your Business?
sponsored by Concur Technologies
WHITE PAPER: Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Concur Technologies

Achieving Compliance and Reducing Risk
sponsored by Comforte AG
VIDEO: Mercury Processing Services International needed a solution that would properly meet key requirements of GDPR and PCI DSS, as well as add another layer of protection that renders data useless to potential hackers. In this video, see how comforte’s enterprise data protection platform helped Mercury fulfill their data security requirements.
Posted: 13 Dec 2019 | Premiered: 13 Dec 2019

Comforte AG

Case Study: Electronic Manufacturing
sponsored by enSilo
CASE STUDY: A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


GDPR & PeopleSoft: Essentials for Compliance
sponsored by Appsian
WHITE PAPER: Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

ThreatQ for Critical Infrastructure
sponsored by ThreatQuotient
RESOURCE: Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

ThreatQuotient

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

10 Opportunities for MSPs and MSSPs to Deliver MDR Services
sponsored by AT&T Cybersecurity
RESOURCE: For service providers, the Managed Detection and Response (MDR) trend creates an opportunity to stay competitive and add value that helps clients defend and respond to cyber threats. Read about 10 opportunities to embrace and deliver competitive MDR services.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

AT&T Cybersecurity

Planning for Office 365 Gaps
sponsored by Mimecast
WHITE PAPER: Although Office 365 is widely used, easy to use and has built in security features, it has resilient gaps in terms of security, data retention and email continuity. In this white paper, learn how to protect your organization by implementing a cyber-resilience strategy for Office 365.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

Mimecast

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

OneLogin
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info