Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed   
Managing Risk Reports
Top 10 Security Trends for 2019
sponsored by Micro Focus & DXC Technology
WHITE PAPER: In this white paper, learn about the top 10 security trends in 2019 & the driving factors behind them.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Micro Focus & DXC Technology

Sailpoint Enabling and Securing Digital Identities
sponsored by SailPoint Technologies
VIDEO: SailPoint's open identity platform helps enterprises see everything, govern everything and empower everyone. Download this video to learn how SailPoint's identity platform helps enterprises enable their workforce by securing digital identities.
Posted: 27 Aug 2019 | Premiered: 27 Aug 2019

SailPoint Technologies

Deconstructing the Risk of Public Cloud: 5 Use Cases
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 15 Aug 2019 | Published: 16 May 2019

Fortinet, Inc.

Reduce Phishing Risk in Minutes with Umbrella and Duo
sponsored by Cisco Umbrella
WEBCAST: Cloud applications provide scale and cost benefits over legacy on-premises solutions. But with more users going direct-to-internet, the risk increases when users bypass security controls. In this webcast, learn how Umbrella and Duo can help you reduce this risk across all of your cloud and on-premises apps with a zero-trust strategy.
Posted: 06 Sep 2019 | Premiered: Sep 6, 2019

Cisco Umbrella

The Human Factor 2019 Report
sponsored by Proofpoint
ANALYST REPORT: Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.
Posted: 12 Sep 2019 | Published: 31 Aug 2019


15 Ways to Weed the Regulatory Violations Out of Your Spend
sponsored by AppZen
WHITE PAPER: How can your organization secure a seamless spend audit? View this checklist to uncover 15 ways to weed regulatory violations out of all spend prior to disbursement, and get the tools you need to secure a seamless spend audit.
Posted: 12 Sep 2019 | Published: 12 Sep 2019


Agile Data Governance: A Bottom-Up Approach
sponsored by Alation
WEBCAST: In this webinar with Malcolm Chisholm of First San Francisco Partners, and Aaron Kalb of Alation, learn best practices for implementing agile data governance and how a data catalog can support these initiatives.
Posted: 28 Aug 2019 | Premiered: Nov 27, 2018


Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: It's no secret that the way people work has changed dramatically over the past few years. In this white paper, explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today's increasingly distributed enterprise.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

Mitigating IP Risk: 3 Strategies to Ensure Open Source Compliance
sponsored by Fossa
WHITE PAPER: Open Source is free, but there are responsibilities inherent to using open source as it comes with a set of obligations and risks. However, there are 3 strategies to mitigate IP risk and ensure open source compliance. Download this white paper to discover each of these approaches.
Posted: 28 Aug 2019 | Published: 28 Aug 2019


ICS Activity Groups and the Threat Landscape
sponsored by Dragos
WHITE PAPER: Throughout 2018, the amount of activity targeting industrial control systems (ICS) increased substantially. Also in 2018, ICS security risk grew even absent any destructive attacks. In this white paper, explore threat activity groups targeting ICS and details about their activity, methodologies, victimologies, and future concerns.
Posted: 05 Aug 2019 | Published: 05 Aug 2019


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement