Loss Management Reports

CW ANZ, July 2020: Expert Advice on Security
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

ComputerWeekly.com

Computer Weekly - 5 November 2019: The benefits of API-first software development
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 Nov 2019

ComputerWeekly.com

Infographic: 5 questions to ask when creating a ransomware recovery plan
sponsored by ComputerWeekly.com
INFOGRAPHIC: Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
Posted: 25 Oct 2021 | Published: 25 Oct 2021

ComputerWeekly.com

RISK-BASED AUTHENTICATION: A Critical Element to Any Zero-Trust Deployment
sponsored by Panda Security
EBOOK: Access this e-book to read about the powerful connection between zero-trust adoption and risk policies, and how multi-factor authentication sits at the core of these approaches by bringing the technology to protect user identities and Cloud applications.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TOPICS:  Risk Management
Panda Security

Transforming risk Why digital transformation depends on integrated risk management
sponsored by ServiceNow
EBOOK: Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.
Posted: 14 Apr 2022 | Published: 14 Apr 2022

ServiceNow

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by SearchSecurity.com
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

SearchSecurity.com

How to Make a SIEM System Comparison Before you Buy
sponsored by SearchSecurity.com
EBOOK: Considering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

SearchSecurity.com

Endpoint Protection & Device Management
sponsored by Seqrite
EGUIDE: The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
Posted: 30 Jan 2018 | Published: 24 Jan 2018

Seqrite

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity