Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed   
Managing Risk Reports
 
Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

Threat Report: Maze Ransomware
sponsored by Cysiv
WHITE PAPER: Since 2019, the Maze threat actor group has been conducting ransomware campaigns where they both block access to data on victims’ machines and threaten to publish sensitive data for ransom – known as Maze ransomware. In this report, discover a comprehensive analysis of Maze ransomware, how it works and how to prevent it.
Posted: 20 Aug 2020 | Published: 07 Jul 2020

Cysiv

Cybereason Mobile
sponsored by Cybereason
DATA SHEET: Mobile devices are now more popular for enterprise use and workplace productivity than desktops or laptops. With millions of malware threats for a growing variety of devices and OS’s alongside cloud and mobile-first apps, the risks are complex and expanding. Don’t get left behind, view this data sheet to learn how to keep mobile devices secure.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

Pros and Cons of Patching With WSUS
sponsored by Automox
RESOURCE: Windows Server Update Services (WSUS) is a widely used patch management tool designed to address challenges related to manual patching. However, there are scalability and usability issues when it comes to using WSUS. This article highlights the pros & cons of using WSUS, read on to see what they are.
Posted: 13 Apr 2020 | Published: 31 May 2019


COVID-19 App Supplier Risk
sponsored by Syniti
PRODUCT DEMO: Watch this brief video to learn how you can use Syniti’s app to track and manage your supplier risk in times of uncertainty.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Syniti

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
WHITE PAPER: Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Veracode, Inc.

A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
sponsored by IBM
RESOURCE: Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

5 Questions Every CIO Must Answer in the Coronavirus Age
sponsored by Hitachi Vantara
WHITE PAPER: The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).
Posted: 25 Jun 2020 | Published: 23 Jun 2020

Hitachi Vantara

All Good Remediation Strategies Begin with Collaboration
sponsored by Vulcan
RESOURCE: As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.
Posted: 27 May 2020 | Published: 06 Apr 2020

Vulcan
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info