Managing Cloud Computing Risk
sponsored by TechTarget Security
EGUIDE:
Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.
Posted: 11 Apr 2012 | Published: 11 Apr 2012
|
|
|
E-Guide: VM in the Cloud
sponsored by TechTarget Security
EGUIDE:
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
Posted: 01 Feb 2012 | Published: 31 Jan 2012
|
|
|
E-Guide: Best practices for pen testing Web applications
sponsored by TechTarget Security
EGUIDE:
This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011
|
|
|
Remediating IT vulnerabilities: Quick hits for risk prioritization
sponsored by TechTarget Security
EGUIDE:
There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.
Posted: 01 Sep 2011 | Published: 25 Aug 2011
|
|
|
Establishing a Formal Cyber Intelligence Capability
sponsored by Verisign, Inc.
WHITE PAPER:
While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
Posted: 03 May 2012 | Published: 03 May 2012
|
|
|
How much security do you really need?
sponsored by IBM
WHITE PAPER:
Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011
|
|
|
Channel executives see need to bolster hospital IT security
sponsored by Hewlett Packard Enterprise
EGUIDE:
Regardless of the size of the institution, hospitals need a sufficient IT security system in place. This E-guide explores why channel professionals and VARs should not only understand hospital vulnerabilities but also be able to convince customers that risk mitigation is worth the price.
Posted: 12 Apr 2012 | Published: 12 Apr 2012
|
|
|
Comparing health care data security compliance to other industries
sponsored by Hewlett Packard Enterprise
EGUIDE:
This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.
Posted: 09 Apr 2012 | Published: 09 Apr 2012
|
|
|
Risk-Based Test Automation from a Business Process Perspective: Automating the Testing of Critical Business Processes Enables you to Manage Change More Effectively
sponsored by Worksoft
WHITE PAPER:
Being able to adapt your business processes to changing environments effectively is crucial to the overall success of your business. Read this white paper to learn how SAP users can implement the best risk-based testing strategies and the right automated testing tool to accommodate change.
Posted: 02 Apr 2012 | Published: 02 Apr 2012
|
|
|
Setting standards in IT Industries
sponsored by DLT Solutions
EGUIDE:
Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.
Posted: 19 Mar 2012 | Published: 16 Mar 2012
|
|
|
Counterparty Risk: Are We Leveraging Our Tools?
sponsored by Sybase, an SAP company
WHITE PAPER:
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012
|
|
|
Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER:
This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012
|
|
|
Computer Weekly - 31 January 2012: The importance of IT strategy
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now.
Posted: 30 Jan 2012 | Published: 31 Jan 2012
|
|
|
The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER:
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012
|
|
|
X-Force Mid-Year Trend Report
sponsored by IBM
ANALYST REPORT:
This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Posted: 11 Jan 2012 | Published: 11 Jan 2012
|
|
|
Managing the Risk of Network Changes
sponsored by RedSeal Networks
WHITE PAPER:
This paper discusses the challenges of change management and offers an effective 6-stage process for managing change. In addition, discover how RedSeal can improve the efficiency and effectiveness of each stage.
Posted: 14 Dec 2011 | Published: 14 Dec 2011
|
|
|
Balancing compliance with information security threat assessment
sponsored by IBM
EGUIDE:
This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.
Posted: 06 Dec 2011 | Published: 06 Dec 2011
|
|
|
E-Guide: Integrating security into the ALM lifecycle
sponsored by IBM
EGUIDE:
In this expert e-guide, learn the risks businesses take by not taking application security measures seriously - and find out what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 21 Nov 2011
|
|
|
Compliance and Risk Management: Factoring compliance as part of your risk management equation
sponsored by IBM
EBOOK:
Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.
Posted: 14 Nov 2011 | Published: 14 Nov 2011
|
|
|
When Benefits Outweigh the Fears: Is Your Business Ready for the Cloud?
sponsored by OpenText Security Solutions
WHITE PAPER:
Eric Johnson was a network admin at a small company of 50 or so workstations. One of the biggest problems he continuously faced was growing pains.
Posted: 10 Nov 2011 | Published: 10 Nov 2011
|
|
|
Real-Time Risk Monitoring
sponsored by Sybase, an SAP company
WHITE PAPER:
Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk.
Posted: 02 Nov 2011 | Published: 02 Nov 2011
|
|
|
SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2
sponsored by IBM
EGUIDE:
This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
Posted: 20 Sep 2011 | Published: 20 Sep 2011
|
|
|
Delivering high quality applications faster with reduced risk & cost
sponsored by IBM
WHITE PAPER:
Improve time to value and quality by reducing rework and cost through faster stakeholder consensus, increased productivity, better process automation, and anytime-anywhere decision support for application software. Download the paper for more information on delivering high quality applications faster with reduced risk & cost.
Posted: 02 Sep 2011 | Published: 02 Sep 2011
|
|
|
SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program
sponsored by IBM
EGUIDE:
This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
Posted: 25 Aug 2011 | Published: 25 Aug 2011
|
|
|
SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization
sponsored by IBM
EGUIDE:
Defining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis.
Posted: 24 Aug 2011 | Published: 24 Aug 2011
|
|