ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • Protecting Data in The Cloud 2019 Thales Cloud Security Study

    Sponsored by: Thales

    During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.

  • Managing Risk in the Digital Era

    Sponsored by: Cyber-Ark Software

    It’s no secret that businesses must embed cybersecurity into their digital transformation programs to help mitigate threats and manage risk. In this white paper, CISOs reveal their digital transformation secrets to success when managing risk in the digital era.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell Technologies

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • Remote Vendor Access: A Growing Attack Vector

    Sponsored by: Cyber-Ark Software

    Organizations today rely on 3rd party vendors more than ever. Although these arrangements can provide valuable services, they also bring with them significant security considerations and risk. In this white paper, learn about CyberArk Alero which is designed to provide fast, easy and secure privileged access for remote vendors.

  • Computer Weekly - 5 November 2019: The benefits of API-first software development

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.

  • Advanced Data Protection for Midsize Enterprises

    Sponsored by: InteliSecure

    Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.

  • Cloud Security Analytics and Policy Management

    Sponsored by: Fortinet, Inc.

    When it comes to securing public cloud resources, integration of security controls helps organizations protect data, prevent intrusions, fight threats, and satisfy auditors. Discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.

  • Best Practices for Data Privacy Programs

    Sponsored by: Ionic Security

    Data Privacy – it’s on everyone’s mind. Privacy professionals are left overwhelmed. Companies don’t know where to turn. Luckily, this guide will walk you through privacy programs and how to segment and prioritize different best practices and technologies that support the scale of your business. Read on to get started.

  • Supporting Cybersecurity & Privacy Standards with ITAM

    Sponsored by: Snow Software

    Cybersecurity is now a priority across the entire business, from the board-level down as companies increasingly rely on operating models that require data sharing. With company reputations hanging in the balance, it’s essential that organizations align their policies around data handling and cybersecurity. Read on to learn more.

  • Enhancing IoT Visibility and Security

    Sponsored by: Extreme Networks

    Many IoT devices were designed without imbedded security features, which is posing a security risk to many organizations. In this webcast, learn about the risks and attacks associated with IoT, how to approach IoT security, and how Extreme solutions can help.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • 2019 True Cost of Fraud Study

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study explores the evolution, expansion and cost of fraud to deliver insights and recommendations on how to effectively sustain your business, successfully manage fraud risks and strengthen customer trust and loyalty. Download the report to explore key findings.

  • Secure by Design: A Roadmap to Cybersecurity Success

    Sponsored by: Cyberfort

    The changing threat landscape, at first glance, seems complicated. However, there are methods to mitigate threats that will not adversely impact your business operations. In this white paper, learn how to assess your security posture and provide the tools necessary to enable your organization to take a more holistic approach to cybersecurity.

  • Accelerating Security Response

    Sponsored by: ServiceNow

    While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.

  • Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In

    Sponsored by: LexisNexis® Risk Solutions

    The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.

  • Cybercrime Networks: How Businesses Can Join Forces to Beat Fraudsters

    Sponsored by: LexisNexis® Risk Solutions

    Just because businesses are hardening their defenses against cybercrime, doesn’t mean fraudsters are giving up. Instead, they’re getting smarter — and taking a much more collaborative approach. In this resource, learn how businesses can join together to defend against fraud.

  • LexisNexis Risk Solutions 2019 True Cost of Fraud Study E-commerce/Retail Report

    Sponsored by: LexisNexis® Risk Solutions

    This research provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants (retail and online/mobile) should be aware of as they add new payment mechanisms and expand channels into online, mobile, and international sectors.

  • SaltStack: SecOps

    Sponsored by: SaltStack

    By changing how organizations approach specific problems, much of the pain in IT operations they currently endure can be removed allowing them to be more effective, efficient, and secure. In this white paper, learn about SaltStack SecOps which aims to help IT professionals use intelligent automation to secure and manage their IT environment.

  • IT and Security Working Better Together

    Sponsored by: ServiceNow

    With cyber exposure gaps continuing to increase, organizations need to up their vulnerability management strategy to resolve the most critical vulnerability first, reducing the risk window and potential exposure. Dive into this brief to learn how Optiv, ServiceNow, and Tenable are working together.

  • True Cost of Fraud Webinar

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.

  • Evaluating Vulnerability Risk Management Providers

    Sponsored by: Rapid7

    As vulnerability risk management evolves to address customers’ needs, this Forrester Wave seeks to highlight solutions that help customers prioritize remediation efforts. In the report, explore an evaluation of 13 vulnerability risk management providers.

  • IBM Security Guardium Analyzer Data Sheet

    Sponsored by: IBM

    In today’s digital world, data is our most complex and critical asset. It runs our businesses making it not only crucial to the organizations that store it, but also a high value target to malicious actors. In this brief, learn how IBM Security Guardium Analyzer can help organizations get started on their data security and compliance journeys.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.