ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Putting Cybercrime in Perspective

    Sponsored by: InteliSecure

    When it comes to cybercrime, it can difficult to separate hype from the truth. This white paper puts these threats into perspective to help you to understand your organization’s risk appetite, the cost of data loss and the steps your organization needs to take to reduce cybercrime impact.

  • Respond to the Changing Mobility Landscape

    Sponsored by: Smarsh

    As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • Computer Weekly - 5 November 2019: The benefits of API-first software development

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.

  • Advanced Data Protection for Midsize Enterprises

    Sponsored by: InteliSecure

    Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.

  • Accelerating Security Response

    Sponsored by: ServiceNow

    While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • Enabling Effective Data Protection

    Sponsored by: InteliSecure

    Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.

  • Considerations for CuttingEdge Threat Intelligence & Incident Response

    Sponsored by: Farsight Security

    The use of a cyberthreat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.

  • 3 Steps to Managing Shadow IT

    Sponsored by: Cisco Umbrella

    In today's digital workplace, organizations, departments, and individual users are embracing the cloud and leveraging new apps at rapid speed. This makes it difficult for security leaders to track app use and ensure that proper protections are in place. In this white paper, uncover 3 steps to managing shadow IT.

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    Sponsored by: ComputerWeekly.com

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

  • 5 Ways to Reduce Risk and Boost Productivity

    Sponsored by: Citrix

    To most IT pros, security and flexibility coexisting sounds like fantasy. Rest assured—it doesn't have to be. In this e-book, learn 5 ways to start immediately reducing the risks and security concerns posed by remote work, while simultaneously improving productivity—as impossible as that might sound.

  • 5 Steps to Minimize Your Exposure to Ransomware Attacks

    Sponsored by: Centrify Corporation

    According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

  • The Anatomy of a Hack: Perception vs. Reality

    Sponsored by: Centrify Corporation

    There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.

  • The Latest Trends in Data Cataloging for BI

    Sponsored by: Alation

    In this webinar, watch Dresner Advisory Service and Alation discuss the latest trends in data cataloging for BI. Learn about the latest findings from Dresner Advisory Services' second annual Data Catalog Market Study, and discover why 90% of respondents believe that data governance is critical to business success.

  • Agile Data Governance: A Bottom-Up Approach

    Sponsored by: Alation

    In this webinar with Malcolm Chisholm of First San Francisco Partners, and Aaron Kalb of Alation, learn best practices for implementing agile data governance and how a data catalog can support these initiatives.

  • 4 Steps to Help You Practice for the CISSP exam

    Sponsored by: TechTarget

    Are you ready for the CISSP exam? Your free CISSP prep guide awaits. Add your unique insights to our market research program to access your free PDF download and become one step closer to earning your certification!

  • 3 Tenets of Security Protection for State and Local Government and Education (SLED)

    Sponsored by: Dell Technologies

    Security is the utmost priority for IT decision-makers in government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data. In this resource, explore important factors to consider when incorporating security into IT modernization initiatives.

  • Infographic: 2019 IT Priorities - Middle East

    Sponsored by: ComputerWeekly.com

    In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.

  • Best Practices for Stopping Risk in its Tracks

    Sponsored by: Smarsh

    How can firms improve their supervision workflows to better reveal risk? In this guide, examine some strategies for staying on top of the rapidly evolving communications landscape, and the new vectors for risk it offers.

  • Barracuda Advanced Threat Protection for SD-WAN

    Sponsored by: Barracuda

    Tune into this quick, 4-minute video to learn how to protect your users, data, and apps from advanced threats and malware—both at the headquarters and at branch office locations.

  • The Top Industries at Risk for Cyber Attacks

    Sponsored by: Barracuda

    This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.