Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed   
Managing Risk Reports
 
The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019
sponsored by IBM
ANALYST REPORT: This Forrest Wave report can help you understand and assess the data security solution landscape, and how these solutions can address your business and technology challenges. Read on for an analysis of 13 data security vendors and find out which vendors are leading the pack.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

IBM

Rethinking Cyber Operations: Creating Clarity Out of Complexity
sponsored by Optiv
WHITE PAPER: Rethinking and evolving cyber operations is key to reducing complexity and achieving a cybersecurity model aligned to organizational risk. Download this white paper for insights into the innovation landscape, key symptoms of lagging cyber operations and a roadmap that organizations can follow to achieve a new cyber operations paradigm.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Optiv

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Protection Inside and Outside the Office: The New State of Cybersecurity
sponsored by Cisco Umbrella
RESOURCE: Download this infographic to explore key findings from the Enterprise Strategy Group's survey of 450 cybersecurity experts on their experience protecting a network without perimeters.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Computer Weekly - 5 November 2019: The benefits of API-first software development
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
Posted: 01 Nov 2019 | Published: 05 Nov 2019

ComputerWeekly.com

Case Study: Electronic Manufacturing
sponsored by enSilo
CASE STUDY: A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


How to Secure the Human Link
sponsored by Mimecast
ANALYST REPORT: Security and risk management leaders must provide security awareness training to ensure employees protect the enterprises' data and intellectual property. But, finding the best way to do this can be difficult. In this Gartner research report, explore 3 best practices to develop and maintain a cybersecure workforce.
Posted: 31 Jul 2019 | Published: 02 May 2018

Mimecast

15 Ways to Weed the Regulatory Violations Out of Your Spend
sponsored by AppZen
WHITE PAPER: How can your organization secure a seamless spend audit? View this checklist to uncover 15 ways to weed regulatory violations out of all spend prior to disbursement, and get the tools you need to secure a seamless spend audit.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

AppZen

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

2019 State of OT/ICS Cybersecurity Survey
sponsored by Nozomi Networks
WHITE PAPER: In this 2019 SANS OT/ICS cybersecurity survey, explore the challenges with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations.
Posted: 18 Sep 2019 | Published: 12 Jun 2019

Nozomi Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement