Business of Information Technology  >   Business Management  >   Risk Management  >  

Occupational Health

RSS Feed   
Occupational Health Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

5 Ways to Attract the Best Talent in Your Industry
sponsored by Cornerstone OnDemand
RESOURCE: In today's shrinking talent pool, companies are finding it harder to attract the talent they need. Inside, discover 5 simple ways to attract the top talent in your industry, and get the tools you need to combat talent disparity within your organization.
Posted: 13 May 2019 | Published: 13 May 2019

Cornerstone OnDemand

The Truths and Lies of IoT Security: Monitoring Connected Devices
sponsored by MASERGY
WHITE PAPER: As the Internet of Things (IoT) accelerates the pace of the enterprise with data-driven decision making, CEOs, CIOs, and CISOs are making the dash for the IoT playing field. But how do they get in the game while not jeopardizing security? In this white paper, learn about key security considerations for IoT.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

MASERGY

Certification Renewal, Rebooted
sponsored by BenchPrep
CASE STUDY: In this case study, learn how CompTIA addressed the tech workforce's learning needs and increased business revenue with a revamped, on-demand continuing education program from BenchPrep.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

BenchPrep

Verizon Risk Report
sponsored by Verizon
RESOURCE: Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Verizon

10 Steps to Choosing the Right ERP Software for Your Organization
sponsored by ECi
WHITE PAPER: In this e-book, discover 10 best practices for ERP software selection. Explore helpful tips for a successful ERP implementation, and get the tools you need to make the best ERP software selection for your organization.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

ECi

CyberArk PAS Assessment Tool
sponsored by CyberArk Software, Inc
PRODUCT OVERVIEW: The commonality in most data breaches and cyberattacks is the exploitation of privileged accounts, credentials and access keys. In this solution brief, learn how CyberArk's Privileged Access Security Assessment Tool can help you evaluate your current privileged access security risk and vulnerabilities.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

CyberArk Software, Inc

Driving in the Data Security Fast Lane: Secureworks Puts McLaren in Pole Position
sponsored by Dell SecureWorks
CASE STUDY: In motorsport, there are huge quantities of data being processed by engineers in the pit. Keeping this information secure and available when needed is essential. In this case study, learn how McLaren was able keep their data secure by deploying Securework's full cybersecurity platform across the organization to assess threats in real time.
Posted: 22 May 2019 | Published: 22 May 2019

Dell SecureWorks

Continuous Cyber Situational Awareness
sponsored by FireMon
WHITE PAPER: Enterprises can use continuous monitoring to determine the security posture of systems and the organization at any given moment. Organizations of all sizes should consider a comprehensive continuous monitoring strategy to decrease risk. Download this white paper to learn how you can get started.
Posted: 22 May 2019 | Published: 22 May 2019

FireMon

Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance
sponsored by HackerOne
CASE STUDY: Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement