ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Third-Party Risk Management: How to Avoid the Dangers of Weak Controls

    Sponsored by: ModoModo

    If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.

  • Pilot Light DR for Amazon Web Services

    Sponsored by: CloudVelox

    Speed, safety, and cost are all central concerns surrounding disaster recovery (DR). This is where cloud comes into play. Access this data sheet to learn about the key functions that cloud-based DR for AWS delivers and how they'll impact your business.

  • 2017 Study on Mobile and IoT App Security

    Sponsored by: IBM

    According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.

  • Why License Compliance is a C-Level Issue

    Sponsored by: Matrix42

    Increasing software license complexity wouldn't normally be seen as a C-level issue, but it is now. Access this white paper to learn how to focus your strategy on a centralized license compliance solution that is integrated into the complete IT management lifecycle and why C-level executives need to take a proactive approach.

  • Manage Application Security Risks to Help Protect your Organization’s Critical Data

    Sponsored by: IBM

    Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.

  • Leverage On-Demand Testing with Vulnerability Analytics

    Sponsored by: IBM

    Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.

  • How to Keep Your Data Secure In An Increasingly Insecure World

    Sponsored by: Micron

    Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.

  • Building Trust in a Cloudy Sky

    Sponsored by: Intel Security

    90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."

  • BCBS 239: How You Can Meet Regulatory Obligations & Optimize Cost Reductions

    Sponsored by: SAS

    It's been a few years since the Basel Committee on Banking Supervision (BCBS) published BCBS 239, but many institutions are still struggling to comply with this regulation. This white paper explains what's needed for superior risk management processes and provides a framework for adopting BCBS 239 successfully.

  • Lowering Business Risk with Data

    Sponsored by: Cloudera

    Companies must stay one step ahead of looming risks. Learn how you can reduce your overall risk exposure by more effectively leveraging your data.

  • How the Houston Astros Protected their Network from Internet Threats

    Sponsored by: ContentKeeper

    Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.

  • Object Storage 101

    Sponsored by: ComputerWeekly.com

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

  • Methods for Preventing Hospital Ransomware Infections and Cyberattacks

    Sponsored by: Cisco

    The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.

  • Learn To Build A Holistic Cybersecurity Program

    Sponsored by: Presidio Networked Solutions

    In this expert-eguide, learn how you can take a proactive approach to protecting your information systems, and how to vet vendors before trusting them with your data.

  • How IT Innovations Can Add Value To Your Business

    Sponsored by: Coupa

    Innovation is always top-of-mind for CIOs. They must provide new technologies to their users while responding to business needs as they change over time – a very daunting task. In this white paper, discover an overview of IT technology innovations that can help CIOs balance the old with the new.

  • Are we trusting social networks too much?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Case Study: How OLX Optimized Procurement, Met Efficiency, Compliance in a New Environment

    Sponsored by: Coupa

    OLX is the world's leading classifieds platform for emerging markets – and they had a problem. They needed a way to ensure that they could meet compliance and manage risk after moving from the US to the Netherlands. In this case study, discover how they managed to ensure efficiency, compliance and visibility in their new environment.

  • 3 Risks in the Oil and Gas Industry to Overcome

    Sponsored by: SNP America, Inc.

    During mergers and acquisitions (M&As), business operations must stay intact (and, in fact, speed up) while reducing risks. Learn how oil and gas companies are overcoming M&A challenges, and 3 key strategies for your organization to do the same.

  • Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.

  • Protecting Your Business in the Digital Transformation Journey

    Sponsored by: Hewlett-Packard Enterprise

    As digital transformation shifts the business risk landscape, IT security must change with it. In this white paper, discover the role mobile devices play in modern security networks, how to build a comprehensive security program and more.

  • The Benefits of Bug Bounty Programs and Security Code Testing

    Sponsored by: Veracode, Inc.

    In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.

  • Global Risks Report 2017

    Sponsored by: ComputerWeekly.com

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

  • Navigating Market Complexity to Fulfill Network Security Requirements

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

  • What's The Best Risk Analysis Method for Enterprises?

    Sponsored by: Presidio Networked Solutions

    In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.