ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Why License Compliance is a C-Level Issue

    Sponsored by: Matrix42

    Increasing software license complexity wouldn't normally be seen as a C-level issue, but it is now. Access this white paper to learn how to focus your strategy on a centralized license compliance solution that is integrated into the complete IT management lifecycle and why C-level executives need to take a proactive approach.

  • Manage Application Security Risks to Help Protect your Organization’s Critical Data

    Sponsored by: IBM

    Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.

  • Leverage On-Demand Testing with Vulnerability Analytics

    Sponsored by: IBM

    Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.

  • How to Keep Your Data Secure In An Increasingly Insecure World

    Sponsored by: Micron

    Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.

  • Building Trust in a Cloudy Sky

    Sponsored by: Intel Security

    90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."

  • BCBS 239: How You Can Meet Regulatory Obligations & Optimize Cost Reductions

    Sponsored by: SAS

    It's been three years since the Basel Committee on Banking Supervision (BCBS) published BCBS 239, but many institutions are still struggling to comply with this regulation. Avoid the complications with this white paper, which provides a framework for adopting BCBS 239 successfully.

  • Lowering Business Risk with Data

    Sponsored by: Cloudera

    Companies must stay one step ahead of looming risks. Learn how you can reduce your overall risk exposure by more effectively leveraging your data.

  • How the Houston Astros Protected their Network from Internet Threats

    Sponsored by: ContentKeeper

    Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.

  • Object Storage 101

    Sponsored by: ComputerWeekly.com

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

  • Methods for Preventing Hospital Ransomware Infections and Cyberattacks

    Sponsored by: Cisco

    The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.

  • Learn To Build A Holistic Cybersecurity Program

    Sponsored by: Presidio Networked Solutions

    In this expert-eguide, learn how you can take a proactive approach to protecting your information systems, and how to vet vendors before trusting them with your data.

  • How IT Innovations Can Add Value To Your Business

    Sponsored by: Coupa

    Innovation is always top-of-mind for CIOs. They must provide new technologies to their users while responding to business needs as they change over time – a very daunting task. In this white paper, discover an overview of IT technology innovations that can help CIOs balance the old with the new.

  • Are we trusting social networks too much?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Cybersecurity Essentials for 2017

    Sponsored by: Neustar

    In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine essential cybersecurity trends and highlight key tactics to better prepare you for what the coming year may bring.

  • Case Study: How OLX Optimized Procurement, Met Efficiency, Compliance in a New Environment

    Sponsored by: Coupa

    OLX is the world's leading classifieds platform for emerging markets – and they had a problem. They needed a way to ensure that they could meet compliance and manage risk after moving from the US to the Netherlands. In this case study, discover how they managed to ensure efficiency, compliance and visibility in their new environment.

  • 3 Risks in the Oil and Gas Industry to Overcome

    Sponsored by: SNP America, Inc.

    During mergers and acquisitions (M&As), business operations must stay intact (and, in fact, speed up) while reducing risks. Learn how oil and gas companies are overcoming M&A challenges, and 3 key strategies for your organization to do the same.

  • Why Mobile Devices are the Biggest Enterprise Security Threat

    Sponsored by: BlackBerry

    Enterprises are losing the security battle and mobile devices are the biggest threat. In this webcast, learn effective ways to manage risks and mitigate threats associated with mobile devices and how mobile security can enable your business and employees to be more productive.

  • Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.

  • The Benefits of Bug Bounty Programs and Security Code Testing

    Sponsored by: Veracode, Inc.

    In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.

  • Global Risks Report 2017

    Sponsored by: ComputerWeekly.com

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

  • Navigating Market Complexity to Fulfill Network Security Requirements

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.

  • IT Security 101: Think Like A Cybercriminal

    Sponsored by: Solarwinds MSP

    In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the 6 key things to consider when assessing your IT security plan.

  • Secure, Cloud-Managed Wifi

    Sponsored by: WatchGuard Technologies, Inc.

    In this white paper, learn how to implement Wi-Fi in safe, protected airspace without the normal administrative headaches.

  • Focus: Securing for the future

    Sponsored by: ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Malware Prevention vs. Detect and Respond

    Sponsored by: Dell India

    Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.