Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed   
Managing Risk Reports
A Guide to Digital Identity Verification
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019


ACBA-Credit Agricole Bank Manages Ever Growing, Ever Changing Risks from the Threat Landscape
sponsored by Symantec
CASE STUDY: ACBA recognized a need to proactively protect its sensitive information across their technologies. In order to do this, they needed a centralized solution. In this case study, read about ACBA's experience deploying Symantec Endpoint Protection which they also integrated with Symantec Messaging Gateway and Symantec Loss Prevention.
Posted: 30 Jan 2019 | Published: 30 Jan 2019


How Security Ratings Improve Risk Awareness While Delivering a Solid ROI
sponsored by Security Scorecard
WHITE PAPER: Combatting cybersecurity risk is a difficult challenge. Without visibility into internal and external risk, this battle becomes even harder. In this white paper, learn how security ratings offer critical insight into vulnerabilities presented both in your environment and the environment of third-parties.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Security Scorecard

Executing on NIST SP 800-190
sponsored by Twistlock, Inc.
WHITE PAPER: When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.
Posted: 08 Aug 2018 | Published: 08 Aug 2018


File Sharing and Collaboration Leads to Security Gaps in Financial Services Firms
sponsored by BlackBerry
RESEARCH CONTENT: This research brief focuses on unstructured data, and the security risks present in many of the internal business processes that use it. A common misstep in financial institutions is the accidental sharing of sensitive files. In this research brief, explore how BlackBerry Workspace can help reduce the risk of sharing information.
Posted: 20 Feb 2019 | Published: 31 Dec 2017


Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution. This Gartner research report provides information about SIEM solutions and an analysis of vendors.
Posted: 23 Jan 2019 | Published: 03 Dec 2018

LogRhythm, Inc.

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: Financial institutions have long been leaders in information security, spending a significant amount of their IT budgets on safeguarding their companies. While they have always been working on reducing threats, new challenges continue to emerge. In this white paper, learn about some of the new challenges financial institutions are facing.
Posted: 12 Feb 2019 | Published: 12 Feb 2019


8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
Posted: 01 Oct 2018 | Published: 01 Oct 2018


Understanding Security Ratings
sponsored by Security Scorecard
WHITE PAPER: Security ratings grade your organization on how well it protects information. In a digital world, the importance of data and your company's protection of that data parallels your income and protection of financial assets. In this white paper, learn all things security ratings including what they are and why they are useful.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Security Scorecard

The Seven Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk Services UK Ltd
WHITE PAPER: There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter. An analytics-driven SIEM allows IT to monitor threats and respond quickly to incidents. In this white paper, discover 7 essential capabilities of an analytics-driven SIEM.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk Services UK Ltd

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement