Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed   
Loss Management Reports
 
10-Step Executive Action Plan for Collective Defense
sponsored by IronNet
EBOOK: A collective approach may be beneficial to organizations searching for security advantages.Indeed, a heightened security posture often begins and ends with collaboration. In this e-book, read more about how a combination of organizational preparedness and advanced technology can aid in defending against threats.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

IronNet

Addressing Digital Risks in Business-Critical Infrastructures
sponsored by Schneider Electric
WHITE PAPER: In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.
Posted: 29 May 2020 | Published: 29 May 2020

Schneider Electric

Pulsant Delivers Complete Peace of Mind to Scottish Building Society
sponsored by Pulsant
CASE STUDY: The Scotland Building Society needed risk and revenue loss mitigation capabilities and a secure location for its production servers. Access this case study to view the disaster recovery solution that SBS implemented and the results that it led to, which included a resilient, highly secure data center.
Posted: 28 Feb 2020 | Published: 28 Feb 2020


Software Defined Segmentation Done Easily, Quickly and Right
sponsored by Guardicore
WEBCAST: Recently there has been a realization that traditional methods of segmentation like VLANs and Firewalls are not suitable for today’s rapidly changing enterprise environments. In this webinar, Dave Klein of Guardicore discusses everything you need to know about modern software-defined segmentation.
Posted: 06 Jan 2020 | Premiered: Oct 30, 2019

Guardicore

New Topics on the New Security+ SY0-501 Exam
sponsored by Global Knowledge
WHITE PAPER: In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Global Knowledge

Five Stages to Create A Closed-Loop Security Process with MITRE ATT&CK
sponsored by Cybereason
WHITE PAPER: Prior to MITRE ATT&CK, a security framework that allowed for realistic testing and provided a basis for improvement of security operations process and technology didn’t fully exist. In this white paper, discover the key components of the MITRE ATT&CK framework and 5 stages for creating a closed-loop security process.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Cybereason

Leveraging AI to Modernize Vulnerability Management and Remediation
sponsored by Delve
WHITE PAPER: Advances in AI provide organizations with the ability to automate workloads and offer intelligent decision-making capabilities, easing the burden on IT and security teams and allowing them to focus on strategic imperatives. Download this white paper to learn more about embracing AI to modernize vulnerability management and remediation.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

Five Key Elements of Continuous IT Compliance
sponsored by BMC
WHITE PAPER: As compliance regulations become more stringent, security and compliance teams are under additional pressure to ensure security, reduce risk and avoid conflicts. Download this white paper to learn more about a modern, intelligent approach to security – including 5 critical elements necessary for continuous IT compliance.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BMC

The 5 Most Dangerous New Attack Techniques and How to Counter Them
sponsored by RSA Conference
VIDEO: What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.
Posted: 07 Jul 2020 | Premiered: 28 Feb 2020

RSA Conference

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info