Business of Information Technology  >   Business Management  >   Risk Management  >   Public Health Emergencies  >  

Severe Acute Respiratory Syndrome

RSS Feed   
Severe Acute Respiratory Syndrome Reports
 
Preparing the Enterprise for a Pandemic
sponsored by Avaya Inc.
WHITE PAPER: This article suggests that enterprises need to look externally as much as internally to understand the impact a pandemic might have, and to prepare an appropriate response.
Posted: 09 Jun 2008 | Published: 01 Sep 2006

Avaya Inc.

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: When it comes to data loss prevention (DLP), the important thing to realize is that it's the methodology and execution strategy of your vendor that governs your experience and results. In this white paper, find a 9 step process for implementing and executing a data protection strategy.
Posted: 12 Apr 2019 | Published: 31 Mar 2019

Forcepoint

The Zenefits Bug Bounty Story
sponsored by HackerOne
CASE STUDY: Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Episode 2: The Attack
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Realize Your Digital Ambition: 4 Areas Energy Organizations can Power Digital Initiatives Today
sponsored by Appian
WHITE PAPER: In this e-book, learn how digital technologies can help those in the energy industry improve operations. Discover the 4 ways in which energy organizations can realize their digital ambitions, and explore how those already embracing digital technologies can drive business value and deliver tangible results.
Posted: 13 May 2019 | Published: 13 May 2019

Appian

Introducing the Verizon Risk Report
sponsored by Verizon
RESEARCH CONTENT: This Verizon Risk Report uses daily threat cyber-risk intelligence from multiple sources allowing businesses to make data-driven security decisions and focus their security spending on where it will have the most impact.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Verizon

Case Study: New York Cruise Lines & Armor Cloud Security
sponsored by Armor
CASE STUDY: The New York Cruise Lines wanted to ensure they provided guests with online resources. However, with every new web-facing resource, there's an increased risk of a data breach. In this case study, learn how the New York Cruise Lines were able to secure their hybrid cloud infrastructure by implementing Armor's managed security provider.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Armor

What is an Ounce of Cybersecurity Prevention Worth?
sponsored by Verizon
RESOURCE: Data breaches and their costs are a major risk to your business. But they are a risk that can be mitigated. Understanding theft tactics based on the experiences of others is critically important. In this resource, explore tactics to help prevent data breaches and security holes in your organization.
Posted: 23 May 2019 | Published: 11 Feb 2019

Verizon

10 Steps to Choosing the Right ERP Software for Your Organization
sponsored by ECi
WHITE PAPER: In this e-book, discover 10 best practices for ERP software selection. Explore helpful tips for a successful ERP implementation, and get the tools you need to make the best ERP software selection for your organization.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

ECi

Maturing a Threat Intelligence Program
sponsored by ThreatConnect
WHITE PAPER: In order to fully harness the power of threat intelligence, your organization must make the case for an intelligence-driven security approach and identify the right people to staff the program. In this white paper, explore how ThreatConnect's Threat Intelligence Maturity Model can help you better apply threat intelligence at your organization.
Posted: 01 May 2019 | Published: 01 May 2019

ThreatConnect
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement