Information Security Threats: Building Risk Resilience
sponsored by TechTarget Security
EGUIDE:
Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
Posted: 11 Jul 2013 | Published: 11 Jul 2013
|
|
|
Targeted attacks: Preparation and Mitigation
sponsored by TechTarget Security
EGUIDE:
This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
Posted: 17 May 2013 | Published: 17 May 2013
|
|
|
Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER:
This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013
|
|
|
A Planner's Realistic Guide to Cloud Data Security
sponsored by Dell, Inc. and Intel®
EGUIDE:
This expert e-guide will walk you through the creation of a safe and secure cloud environment.
Posted: 04 Mar 2014 | Published: 04 Mar 2014
|
|
|
Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER:
This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 21 Feb 2014 | Published: 31 Dec 2012
|
|
|
Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:
This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
Guide to OCC updates to governance ruling
sponsored by Iron Mountain
WHITE PAPER:
Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014
|
|
|
An Expert Guide to the PCI DSS 3.0
sponsored by TechTarget Security
EBOOK:
This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014
|
|
|
Identity Management: Implementation And System Support
sponsored by OpenIAM
EGUIDE:
In this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
Posted: 10 Jan 2014 | Published: 10 Jan 2014
|
|
|
EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
sponsored by IBM
WHITE PAPER:
Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
Posted: 06 Dec 2013 | Published: 03 Jul 2013
|
|
|
The State of Next-Generation Market- and Credit-Risk Analytics
sponsored by IBM
WHITE PAPER:
Access the following white paper to gain a firsthand look at the next-generation market and credit-risk analytics that are helping many companies through this touch economic time.
Posted: 25 Nov 2013 | Published: 25 Nov 2013
|
|
|
Business Transformation: Exploring the Requirements of a Strategic Business Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
To keep up with market demands and trends, it is important for organizations to transform their business. This guide explores business transformation and how it reduces risk and cost
Posted: 19 Nov 2013 | Published: 19 Nov 2013
|
|
|
Mastering Risk with Business Forecasting
sponsored by IBM
WHITE PAPER:
This paper discusses how it is risk management practices that play a key part of managing risk today, and shows how developing a more sophisticated understanding of risk and building the management capabilities to match can help organizations stay afloat during tumultuous times.
Posted: 06 Nov 2013 | Published: 06 Nov 2013
|
|
|
Rentokil Initial Improves Software Asset Management
sponsored by Flexera Software
CASE STUDY:
Rentokil Initial, one of the largest business services companies in the world, was struggling with managing their software assets. In this case study, find out how Rentokil was able to implement a mature software asset management process and gain complete control over their software licenses, for reduced costs and lower risk.
Posted: 18 Oct 2013 | Published: 31 Oct 2011
|
|
|
6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
WEBCAST:
In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013
|
|
|
Three Mistakes Companies Make When It Comes to Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER:
In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013
|
|
|
Liquidity risk management; Assessing and planning for adverse events
sponsored by IBM
WHITE PAPER:
This paper takes a close look at the factors involved in the recent crisis and the patterns that resulted in widespread liquidity problems. It also points to specific vulnerabilities faced by financial institutions currently, and highlights best practices for liquidity risk management
Posted: 30 Sep 2013 | Published: 30 Sep 2013
|
|
|
An insurance firm eases regulatory compliance while reducing risk
sponsored by IBM
WHITE PAPER:
Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
Posted: 13 Sep 2013 | Published: 13 Sep 2013
|
|
|
Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER:
Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012
|
|
|
Strategy guide to business protection for hospitals
sponsored by HP and Intel® Xeon® processors
WHITE PAPER:
This white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how you can avoid unplanned downtime, ensuring compliance and the highest quality of patient care.
Posted: 01 Aug 2013 | Published: 15 Nov 2012
|
|
|
IT Reputational Risk Study Overview
sponsored by IBM
VIDEO:
This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012
|
|
|
Where BCDR and GRC Come Together: A CIO's Guide
sponsored by Essextec
EZINE:
In this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.
Posted: 11 Jun 2013 | Published: 11 Jun 2013
|
|
|
Threat Detection (Antivirus Intrusion Prevention)
sponsored by TechTarget Security
EBOOK:
Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013
|
|
|
The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO:
Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013
|
|
|
Combating risk with predictive intelligence: An analytical approach to enterprise risk management
sponsored by IBM
WHITE PAPER:
View this resource to learn more about how your organization can respond and increase their focus on refining sales and operations planning processes. It outlines how companies can reevaluate and distribute their channel strategies and strengthen relationships.
Posted: 15 Apr 2013 | Published: 15 Apr 2013
|
|