ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • E-Guide: VM in the Cloud

    Sponsored by: TechTarget Security

    Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.

  • E-Guide: Best practices for pen testing Web applications

    Sponsored by: TechTarget Security

    This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    Sponsored by: TechTarget Security

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

  • Setting standards in IT Industries

    Sponsored by: DLT Solutions

    Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.

  • Counterparty Risk: Are We Leveraging Our Tools?

    Sponsored by: Sybase, an SAP company

    While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.

  • Facilitating “sound practices” in risk management with IBM OpenPages ORM

    Sponsored by: IBM

    This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.

  • Computer Weekly - 31 January 2012: The importance of IT strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now.

  • The CISOs Guide to Measuring IT Security

    Sponsored by: Lumension

    In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.

  • X-Force Mid-Year Trend Report

    Sponsored by: IBM

    This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.

  • Managing the Risk of Network Changes

    Sponsored by: RedSeal Networks

    This paper discusses the challenges of change management and offers an effective 6-stage process for managing change. In addition, discover how RedSeal can improve the efficiency and effectiveness of each stage.

  • Balancing compliance with information security threat assessment

    Sponsored by: IBM

    This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.

  • E-Guide: Integrating security into the ALM lifecycle

    Sponsored by: IBM

    In this expert e-guide, learn the risks businesses take by not taking application security measures seriously - and find out what can be done to help integrate security with application lifecycle management.

  • Compliance and Risk Management: Factoring compliance as part of your risk management equation

    Sponsored by: IBM

    Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.

  • When Benefits Outweigh the Fears: Is Your Business Ready for the Cloud?

    Sponsored by: OpenText Security Solutions

    Eric Johnson was a network admin at a small company of 50 or so workstations. One of the biggest problems he continuously faced was growing pains.

  • Real-Time Risk Monitoring

    Sponsored by: Sybase, an SAP company

    Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk.

  • SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2

    Sponsored by: IBM

    This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.

  • Delivering high quality applications faster with reduced risk & cost

    Sponsored by: IBM

    Improve time to value and quality by reducing rework and cost through faster stakeholder consensus, increased productivity, better process automation, and anytime-anywhere decision support for application software. Download the paper for more information on delivering high quality applications faster with reduced risk & cost.

  • SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program

    Sponsored by: IBM

    This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.

  • SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization

    Sponsored by: IBM

    Defining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis.

  • Assess Virtualization Security Risk in Six Simple Steps

    Sponsored by: Intel

    There are several critical issues every security pro must consider when evaluating risk in virtual environments. This expert tip provides six simple steps to perform a virtualization security risk assessment and highlights key points to ease security integration as your virtualization project comes together.

  • Understanding Advanced Virtualization Security Practices

    Sponsored by: Intel

    SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.

  • Choosing a Cloud Provider with Confidence

    Sponsored by: GeoTrust, Inc.

    In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.

  • Maintaining Continuous Compliance – a new best practice approach

    Sponsored by: IBM

    When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.

  • Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures

    Sponsored by: Sybase, an SAP company

    Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk!

  • The Next Generation of Cybercrime

    Sponsored by: Dell SecureWorks

    This white paper will educate you about a range of different security threats, as well as, the hackers that perpetrated these viruses. You will also receive a list of best practices for protecting your organization the right way.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.