Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed   
Managing Risk Reports
 
The Black Report 2018 - Decoding the Minds of Hackers
sponsored by Nuix
WHITE PAPER: According to the 2018 Black Report, 34% of respondents have been hacking for more than 10 years. Take a look at this report to learn more about the hackers targeting your enterprise.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Nuix

GDPR: Not Just Compliance
sponsored by DXC
WHITE PAPER: GDPR presents a great opportunity for improved customer experience, deeper customer engagement, and increased sales. Explore this resource to learn more about how GDPR goes beyond simple compliance standards and can offer a greater benefit to your organization.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

DXC

Anatomy of a Cyber Attack The Lifecycle of a Security Breach
sponsored by Oracle Corporation
WHITE PAPER: Security is everyone's job today, from consumers, to system administrators, to executives. Explore this resource to gain insight into the anatomy of a cyberattack, the lifecycle of a security breach and how to augment your current approach to protect your sensitive data.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Oracle Corporation

Wimbledon Increases Security to Focus on the Court, not the Cloud
sponsored by IBM
WEBCAST: The Wimbledon website sees a 300% increase in cyberattacks year after year. Take a look at this webcast case study to uncover how Wimbledon is fighting back against hackers by implementing a strategy that has significantly reduced the number of breaches.
Posted: 08 Mar 2018 | Premiered: Mar 8, 2018

IBM

What Security People Want: Making DevSecOps Happen with Containers
sponsored by Aqua Security
WEBCAST: Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Aqua Security

Traps Machine Learning WP
sponsored by Palo Alto Networks
WHITE PAPER: The endpoint remains the weakest link in enterprise security. Access this resource to learn how effective machine learning can help prevent malware and protect your endpoints.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

Palo Alto Networks

A Practical Guide for GDPR Compliance
sponsored by Druva Software
WHITE PAPER: The GDPR demands significant data protection safeguards to be implemented by organizations. The time to get ready is now, as the consequences of getting it wrong are significant. Explore this Osterman Research white paper to uncover a practical guide for GDPR compliance.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Druva Software

Open Source Risk – Fact or Fiction?
sponsored by Flexera Software
WHITE PAPER: Many new enterprise technologies are centered around open-source technology. This resource explores the risks involved with open-source software and how your enterprise can remain secure.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Flexera Software

The GDPR Playbook
sponsored by Proofpoint, Inc.
WHITE PAPER: Developing a plan to comply with the new rules of the EU GDPR is critical for all organizations. Leverage this guide to help you discover, plan and act on the upcoming GDPR.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Proofpoint, Inc.

Journey to GDPR Readiness
sponsored by IBM
WHITE PAPER: The GDPR represents a unique opportunity to help strengthen privacy compliance and preserve customer trust, while reducing risk exposure and creating a competitive advantage. Uncover one company's journey to GDPR readiness to help your organization prepare.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement