Risk Assessment Research
-
MicroScope - July-August 2024: Is it worth taking a risk?
Sponsored by: MicroScopeIn this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI
-
12 top enterprise risk management trends in 2023
Sponsored by: TechTarget ComputerWeekly.comEnterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
-
Step-by-step disaster recovery planning guide
Sponsored by: TechTarget ComputerWeekly.comIT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
-
CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
Sponsored by: TechTarget ComputerWeekly.comComo o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
-
Infographic: 5 questions to ask when creating a ransomware recovery plan
Sponsored by: TechTarget ComputerWeekly.comCompanies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
-
A Computer Weekly buyer's guide to managing paper processes
Sponsored by: TechTarget ComputerWeekly.comModern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: TechTarget ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
Sponsored by: TechTarget ComputerWeekly.comCyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
Focus: how to avoid being hit by ransomware
Sponsored by: TechTarget ComputerWeekly.comIn this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
-
Object Storage 101
Sponsored by: TechTarget ComputerWeekly.comStandard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
-
Are we trusting social networks too much?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
Global Risks Report 2017
Sponsored by: TechTarget ComputerWeekly.comSociety is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
-
Focus: Securing for the future
Sponsored by: TechTarget ComputerWeekly.com2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
-
Threat management: Essential guide
Sponsored by: TechTarget ComputerWeekly.comSecurity is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
Disaster recovery and business continuity: Essential guide
Sponsored by: TechTarget ComputerWeekly.comNot only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.
-
Cyber Security 2016 and beyond
Sponsored by: TechTarget ComputerWeekly.comCyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: Safestone TechnologiesThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
Presentation Transcript: Be Prepared! Leverage SAP PLM to Navigate Through Uncertain Times
Sponsored by: SAP America, Inc.Read this presentation transcript to learn the business value of PLM in an uncertain economy as well as significant trends in the PLM market. Explore SAP's approach to a new generation of product lifecycle management solutions that will help you remain or become a product and services leader.
-
The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability
Sponsored by: SAP America, Inc.Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability.
-
Information Security Magazine, July 09: Controlling Privileged Accounts
Sponsored by: Information Security MagazineThis month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
-
eBook: Compliance for the Midmarket: Governance, Risk and Technology
Sponsored by: TechTarget CIORead this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
-
The Financial Close: Optimizing Performance and Driving Financial Excellence
Sponsored by: SAP America, Inc.The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls
-
eBook: Understanding GRC
Sponsored by: Informa TechTargetThis in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.
-
Governance, Risk, Compliance: Policy Management - Methods and tools
Sponsored by: TechTarget SecurityThis E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.