IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed   
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
76 - 100 of 392 Matches Previous Page  |  Next Page
Cognitions of a Cybercriminal
sponsored by VMware International Unlimited Company
WHITE PAPER: Cybercriminals grow increasingly creative each year, finding new ways to bypass security methods without detection. This white paper is designed to help CISOs in their pursuit of cybercriminals by offering an inside look into the mindset of their behavior and breaking down their attack patterns. Access now to reserve your copy.
Posted: 15 May 2020 | Published: 31 Jul 2019

VMware International Unlimited Company

HOW TO COMBAT Ransomware
sponsored by VMware International Unlimited Company
WHITE PAPER: Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.
Posted: 15 May 2020 | Published: 15 May 2020

VMware International Unlimited Company

On-Prem SCCM Patch Management Solution - What is The True Cost Burden?
sponsored by Automox
RESOURCE: Organizations looking into purchasing new software or solutions typically focus on the list price of the license and fail to consider the hidden maintenance costs associated. This article dissects Microsoft’s on-prem SCCM patch management solution to reveal its total cost of ownership by uncovering hidden costs.
Posted: 29 Apr 2020 | Published: 17 Apr 2020


Pros and Cons of Patching With WSUS
sponsored by Automox
RESOURCE: Windows Server Update Services (WSUS) is a widely used patch management tool designed to address challenges related to manual patching. However, there are scalability and usability issues when it comes to using WSUS. This article highlights the pros & cons of using WSUS, read on to see what they are.
Posted: 13 Apr 2020 | Published: 31 May 2019


Manage Windows Updates Without WSUS
sponsored by Automox
RESOURCE: Regular patch management is often recognized as a cybersecurity best practice. However, for today’s Windows users, overly complex patching solutions make regular patching unmanageable. In this article, explore the limitations of WSUS, patch management best practices, and discover why you should consider automated patch management.
Posted: 13 Apr 2020 | Published: 26 Dec 2019


4 Ways SailPoint Predictive Identity Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Pulsant Delivers Complete Peace of Mind to Scottish Building Society
sponsored by Pulsant
CASE STUDY: The Scotland Building Society needed risk and revenue loss mitigation capabilities and a secure location for its production servers. Access this case study to view the disaster recovery solution that SBS implemented and the results that it led to, which included a resilient, highly secure data center.
Posted: 28 Feb 2020 | Published: 28 Feb 2020


SAP Compliance Risk Dashboard Appsian Real-Time Analytics
sponsored by Appsian
DATA SHEET: Compliance mandates such as SOX, GDPR, CCPA and others require organizations to maintain details of data access. View this data sheet to see how Appsian’s Compliance Risk Analytics dashboard equips SAP customers with direct, real-time visibility into the activity around high-risk business transactions.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Appsian

Cyber Risk Spotlight Report: 11 Metrics to Watch
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Arctic Wolf Networks, Inc.

Protecting Intellectual Property: Black, White, and Shades of Gray
sponsored by InteliSecure
WHITE PAPER: Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

InteliSecure

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

3 Steps to Managing Shadow IT
sponsored by Cisco Umbrella
WHITE PAPER: In today's digital workplace, organizations, departments, and individual users are embracing the cloud and leveraging new apps at rapid speed. This makes it difficult for security leaders to track app use and ensure that proper protections are in place. In this white paper, uncover 3 steps to managing shadow IT.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

3 Tenets of Security Protection for State and Local Government and Education (SLED)
sponsored by Dell Technologies
RESOURCE: Security is the utmost priority for IT decision-makers in government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data. In this resource, explore important factors to consider when incorporating security into IT modernization initiatives.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Dell Technologies

Barracuda Advanced Threat Protection for SD-WAN
sponsored by Barracuda
PRODUCT DEMO: Tune into this quick, 4-minute video to learn how to protect your users, data, and apps from advanced threats and malware—both at the headquarters and at branch office locations.
Posted: 31 May 2019 | Premiered: 31 May 2019

Barracuda

The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

Email Protection with Asaf Cidon
sponsored by Barracuda
VIDEO: Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
Posted: 29 May 2019 | Premiered: 01 Mar 2019

Barracuda

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Barracuda Lightboard: Total Email Protection
sponsored by Barracuda
VIDEO: This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.
Posted: 28 May 2019 | Premiered: 31 Jan 2019

Barracuda

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 28 May 2019 | Published: 31 Mar 2019

Barracuda

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell Technologies
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT
76 - 100 of 392 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info