Risk Assessment Research
-
How MDM and the Consumerization of IT are Reshaping IT Decision-Making
Sponsored by: TechTarget SecurityAccess this white paper to learn why your organization needs to start integrating IT consumerization and BYOD into its business – and how to get there.
-
Managing Cloud Computing Risk
Sponsored by: TechTarget SecurityHave you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.
-
Taking a Strategic Approach to Risk Management
Sponsored by: TraceSecurityThis e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more.
-
Cybersecurity Information Sharing: Establishing New Protocols
Sponsored by: BMC Software, Inc.This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
-
The truth about cloud storage in health care
Sponsored by: EMC IsilonThis e-guide takes an in-depth look at what it means for health care organizations looking to store data off-site and, specifically, in the cloud. Read now to uncover how you can ensure your cloud provider measures up to HIPAA's stringent regulations.
-
Secure your data – protect your business
Sponsored by: TechTarget ComputerWeekly.comThis guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.
-
Presentation Transcript: Confidential Documents at Risk
Sponsored by: WatchDoxUncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
-
Computer Weekly - 10 January 2012: What’s in store for IT this year?
Sponsored by: TechTarget ComputerWeekly.comIn this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now.
-
Remote Vendor Access: Not All Access Should Be Treated Equally
Sponsored by: Dell SoftwareThis white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
-
2012 - Endpoint Security Best Practices Survey
Sponsored by: Symantec CorporationConsult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
-
HP Fortify Software Security Center- Proactively Eliminate Risk in Software
Sponsored by: Hewlett Packard EnterpriseLearn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook.
-
Best Practices in Securing Your Customer Data in Salesforce, Force.com, and Chatter
Sponsored by: CipherCloudMany organizations want to move to the Salesforce platform, but concerns about data security, privacy, residency, and compliance have held them back. This whitepaper outlines best practices in securing sensitive customer data in Salesforce and outlines "must have" capabilities to overcome emerging cloud threats.
-
Business-Driven Identity and Access Management: Why This New Approach Matters
Sponsored by: AveksaThis informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
-
The Ten Must Haves for Secure Mobile Device Management
Sponsored by: ZenpriseBusinesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
-
Protect citizen data with IBM Rational software
Sponsored by: IBMDigital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
-
Holistic risk management: Perspectives for IT professionals
Sponsored by: IBMBusiness continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
-
Healthcare Information at Risk: Encryption is not a Panacea
Sponsored by: IntelThis resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
-
Approaches for Agile development teams
Sponsored by: IBMThis expert e-guide discusses the different approaches for agile development teams. Learn about a handful of methods from experts Mary LeMieux-Ruibal, Mirkeya Capellan and Lisa Crispin, including focusing more on trends than numbers, employing a risk-based testing approach, calculating testing costs and much more.
-
Risk Management: Safeguarding Against a World of Threats
Sponsored by: HP Enterprise SecurityAccess this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.
-
Supporting information technology risk management
Sponsored by: IBMAccess the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions.
-
Establishing a Formal Cyber Intelligence Capability
Sponsored by: Verisign, Inc.While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
-
How much security do you really need?
Sponsored by: IBMDeciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
-
Channel executives see need to bolster hospital IT security
Sponsored by: Hewlett Packard EnterpriseRegardless of the size of the institution, hospitals need a sufficient IT security system in place. This E-guide explores why channel professionals and VARs should not only understand hospital vulnerabilities but also be able to convince customers that risk mitigation is worth the price.
-
Comparing health care data security compliance to other industries
Sponsored by: Hewlett Packard EnterpriseThis e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.
-
Risk-Based Test Automation from a Business Process Perspective: Automating the Testing of Critical Business Processes Enables you to Manage Change More Effectively
Sponsored by: WorksoftBeing able to adapt your business processes to changing environments effectively is crucial to the overall success of your business. Read this white paper to learn how SAP users can implement the best risk-based testing strategies and the right automated testing tool to accommodate change.