ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Veracode Security Labs

    Sponsored by: Veracode, Inc.

    In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.

  • False cents of security: The price of being compromised

    Sponsored by: ComputerWeekly.com

    Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.

  • Addressing Digital Risks in Business-Critical Infrastructures

    Sponsored by: Schneider Electric

    In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.

  • Runtime Memory Analysis: A Better Way Forward for Vulnerability Management

    Sponsored by: Rezilion

    According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.

  • CCPA legislation overview: Everything you need to know to prepare

    Sponsored by: TechTarget

    The deadline for CCPA is rapidly approaching. With just a few months left to finalize your consumer data protection strategy, it's critical to take a step back and ensure your approach doesn't have any gaps. Our CCPA guidebook equips you with knowledge to better understand the legislation. Complete our survey to reserve your free copy.

  • HTTP Security Headers Guidelines: An Informative Tutorial

    Sponsored by: TechTarget

    In our exclusive expert guide, Who, What & How of HTTP Security Headers, Judith Myerson outlines how to defend your websites using strong HTTP security headers. To claim your free PDF download, participate in our market research program.

  • Lessons and Best Practices from CIO's Experience

    Sponsored by: BlackBerry

    "IT and cyber operations needed to leverage all possible organizational communications modes to get the word out to the entire enterprise to ignore the incoming email and delete it, direct specific action potentially warn our partners about the situation.

  • Hazard Identification, Planning, and Analysis as the Foundation for Effective Crisis Management

    Sponsored by: BlackBerry

    Threat hazard identification and risk assement begins with an in-depth exploration of the threats an organization might face. Understanding this risk environment is essential forbuilding a practical, affordable, and effective risk mitigation plan. Take our brief survey and gain access to our guide for senior leaders.

  • CCPA legislation overview: Everything you need to know to prepare

    Sponsored by: TechTarget

    The deadline for CCPA is rapidly approaching. With just a few months left to finalize your consumer data protection strategy, it's critical to take a step back and ensure your approach doesn't have any gaps. Our CCPA guidebook equips you with knowledge to better understand the legislation. Complete our survey to reserve your free copy.

  • Rapid Response: 3 Immediate Actions You Can Take to Mitigate Supply Risks and Disruptions

    Sponsored by: GEP

    Disruptions to supply chains—like the current COVID-19 crisis and previous recessions—are not new, and yet, it can feel impossible to be fully prepared. Download this white paper to explore 3 actions you can take right now to help mitigate supply risks and disruptions.

  • COVID-19 in APAC:Tech industry lessons & innovations

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.

  • Guide to business continuity planning: COVID-19 and beyond

    Sponsored by: ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • IT Priorities 2020: APAC

    Sponsored by: ComputerWeekly.com

    The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • CW APAC - March 2020: Expert Advice: Security Operations Centre

    Sponsored by: ComputerWeekly.com

    In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.

  • 4 Ways SailPoint Predictive Identity Puts You in Control

    Sponsored by: SailPoint Technologies

    As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.

  • Evaluating Risk Management

    Sponsored by: Atlassian

    As organizations continue to adopt cloud services, assessing the security risk of each service through a standardized evaluation process becomes critical to preventing data breaches. This guide is designed to help your organization develop a security risk scoring system to evaluate potential risks. Download the guide to learn more.

  • SAP Compliance Risk Dashboard Appsian Real-Time Analytics

    Sponsored by: Appsian

    Compliance mandates such as SOX, GDPR, CCPA and others require organizations to maintain details of data access. View this data sheet to see how Appsian’s Compliance Risk Analytics dashboard equips SAP customers with direct, real-time visibility into the activity around high-risk business transactions.

  • Data Analytics in Healthcare: Opportunities & Challenges

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.

  • Incident Management Handbook Premium Upsell

    Sponsored by: Atlassian

    On-call can be, well, a bit stressful. Keeping services available and functioning 24/7 is a demanding process. With the right incident management tools at the ready, you can be more confident about incident resolution. This 71-pe guide is chock-full of insider tips and best practices for incident management. Read the guide here to get started.

  • Cyber Risk Spotlight Report: 11 Metrics to Watch

    Sponsored by: Arctic Wolf Networks, Inc.

    According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.

  • How to Build Out Your Cybersecurity Technology Stack

    Sponsored by: Arctic Wolf Networks, Inc.

    For organizations beginning their journey towards establishing a cybersecurity program, there can be an overwhelming number of vendors to choose from. This white paper is designed to guide organizations as they begin their selection process by providing advice for what to look for when evaluating vendors and service providers.

  • Protecting Intellectual Property: Black, White, and Shades of Gray

    Sponsored by: InteliSecure

    Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell Technologies

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.