IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed   
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 434 Matches Previous Page  |  Next Page
Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
sponsored by ThreatQuotient
CASE STUDY: How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

ThreatQuotient

Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

The State of Ransomware 2020
sponsored by Sophos
WHITE PAPER: Ransomware regularly dominates headlines as one of the most notorious threats facing organizations – but do the successful attacks tell the full story? In this research report, discover what happens when ransomware hits, the impacts of paying the ransom, the emergence of cybersecurity insurance, and more.
Posted: 11 Sep 2020 | Published: 31 May 2020

Sophos

The CIO’s Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

5 Steps to Determine Residual Risk During the Assessment Process
sponsored by Coalfire
RESOURCE: Governance, risk and compliance-related residual risks are risk factors left over after an organization applies security controls to ensure compliance with laws and regulations. Data management gaps create this risk, but spotting it isn’t impossible. Open this article for 5 steps to identifying and offsetting residual risk during an assessment.
Posted: 03 Sep 2020 | Published: 28 May 2020

Coalfire

Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

92% Of The World’s Top Websites Expose Customer Data To Attackers
sponsored by Tala Security
ANALYST REPORT: It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

Penetration Testing Vendor Selection Checklist
sponsored by Synack
RESOURCE: In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack

7 SIEM Trends to Watch in 2020
sponsored by Splunk
WHITE PAPER: In the last year alone, demand for SIEM technology has remained strong, with threat management as the primary driver, and general monitoring and compliance secondary. In this white paper, learn about 7 SIEM trends to watch for in 2020.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Splunk

Cyber Resilient Organization Report 2020
sponsored by IBM
ANALYST REPORT: The volume of cybersecurity incidents has risen, causing disruption to IT and business processes. In fact, 51% of organizations reported a significant business disruption during the past two years due to a cybersecurity incident. What did they report regarding cyber resiliency? How are they planning for the future? Read this report to find out.
Posted: 27 Aug 2020 | Published: 31 Jul 2020

IBM

SCCM Upgrade Checklist | Automate Patch Management in the Cloud
sponsored by Automox
RESOURCE: The digital landscape is constantly evolving, and traditional legacy tools are being replaced by cloud-based SaaS alternatives – and patch management is no exception. However, there are some key factors to consider prior to making the switch. Read this article to make sure you’re ready for cloud-based patch management.
Posted: 25 Aug 2020 | Published: 17 Aug 2020


Paradise Lost: Exploiting the New Distributed Workforce Economy
sponsored by Tanium
WHITE PAPER: Organizations have noted the widened gaps in IT visibility since remote work became the norm - now it’s time to react. View this white paper to learn how unified endpoint security (UES)/unified endpoint management (UEM) can help detect and prevent these pandemic-related threats.
Posted: 24 Aug 2020 | Published: 02 Jun 2020

Tanium

Data Protection Compliance in the UK
sponsored by Zivver
EBOOK: GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Zivver

TCO Study of WSUs and SCCM
sponsored by Automox
WHITE PAPER: Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.
Posted: 24 Aug 2020 | Published: 24 Aug 2020


Threat Report: Maze Ransomware
sponsored by Cysiv
WHITE PAPER: Since 2019, the Maze threat actor group has been conducting ransomware campaigns where they both block access to data on victims’ machines and threaten to publish sensitive data for ransom – known as Maze ransomware. In this report, discover a comprehensive analysis of Maze ransomware, how it works and how to prevent it.
Posted: 20 Aug 2020 | Published: 07 Jul 2020

Cysiv

Tax Automation reduces costs and meets security and compliance requirements
sponsored by Pulsant
CASE STUDY: In this case study, follow Tax Automation, a tax software company based in the UK, as they partner with Pulsant to streamline the delivery and accessibility of their offerings through a transition towards a SaaS model. Read on to discover the Tax Automation’s challenges, required capabilities and results.
Posted: 20 Aug 2020 | Published: 20 Aug 2020


Network Complexity Creates Inefficiencies While Ratcheting Up Risks
sponsored by Fortinet, Inc.
WHITE PAPER: Nearly 80% of organizations are introducing digital innovations faster than they can secure them. They are tangled up in complexity, leaving them vulnerable to breaches as a result. Without the right strategy, the risk outweighs the reward. Jump into this white paper to get a closer look at the implications of innovating too quickly.
Posted: 19 Aug 2020 | Published: 09 May 2020

Fortinet, Inc.

Fighting Fraud
sponsored by Dtex
NEWSLETTER: In this issue of the Fighting Fraud e-newspaper, observe a series of articles dedicated to highlighting the global trends, challenges and advancements as they relate to fraud. Key topics covered in this issue include Brexit, artificial intelligence, insider threats, the true cost of cybercrime, and more.
Posted: 13 Aug 2020 | Published: 23 Oct 2019

Dtex

Everyone as a Trusted Insider
sponsored by Dtex
PRODUCT OVERVIEW: Insider threats are on the rise, and traditional monitoring is too reactionary to handle today’s sophisticated attack methods. In this report, take a closer look at Dtex’s replacement to traditional employee monitoring – designed to promote employee privacy, proactive threat prevention, behavioral understanding of threats, and more.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Dtex

Dtex Intercept Next-Gen Insider Threat Platform
sponsored by Dtex
PRODUCT OVERVIEW: Insider threats, both malicious and accidental, are a growing concern amongst today’s organizations. The following solution brief highlights the key features and capabilities of Dtex Intercept, an insider threat platform designed to equip users with the ability to proactively identify, categorize and isolate potentially harmful insider behavior.
Posted: 12 Aug 2020 | Published: 12 Aug 2020

Dtex

CipherTrust Data Discovery and Classification from Thales
sponsored by Thales
VIDEO: To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.
Posted: 10 Aug 2020 | Premiered: 23 Mar 2020

Thales

Privileged Account Management for Dummies
sponsored by IBM
EBOOK: In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Identity & Access Management from IBM
sponsored by IBM
RESOURCE: Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
sponsored by IBM
RESOURCE: Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM
1 - 25 of 434 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info