ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Computer Weekly - 5 November 2019: The benefits of API-first software development

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.

  • Advanced Data Protection for Midsize Enterprises

    Sponsored by: InteliSecure

    Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.

  • Supporting Cybersecurity & Privacy Standards with ITAM

    Sponsored by: Snow Software

    Cybersecurity is now a priority across the entire business, from the board-level down as companies increasingly rely on operating models that require data sharing. With company reputations hanging in the balance, it’s essential that organizations align their policies around data handling and cybersecurity. Read on to learn more.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • Critical Watch Report: 2019

    Sponsored by: Alert Logic

    SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.

  • Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System

    Sponsored by: Claroty

    A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.

  • Enabling Effective Data Protection

    Sponsored by: InteliSecure

    Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.

  • The Global Risks Report 2019 14th Edition

    Sponsored by: Nozomi Networks

    Technology continues to play a profound role in shaping the global risks landscape. A top technological concern is cyberattacks which pose risks to critical infrastructure. In The Global Risk Report 2019, learn why the vulnerability of critical technological infrastructure is a growing national security concern.

  • Case Study: Electronic Manufacturing

    Sponsored by: enSilo

    A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.

  • 2019 State of OT/ICS Cybersecurity Survey

    Sponsored by: Nozomi Networks

    In this 2019 SANS OT/ICS cybersecurity survey, explore the challenges with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations.

  • Detecting and Preventing Cybercrime and Fraud

    Sponsored by: Concur Technologies

    In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.

  • The New Age of Fraud

    Sponsored by: Concur Technologies

    Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.

  • How Do You Cultivate Compliance to Protect Your Business?

    Sponsored by: Concur Technologies

    Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.

  • The Human Factor 2019 Report

    Sponsored by: Proofpoint

    Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.

  • TPCRM 101: A Guide for Beginners

    Sponsored by: CyberGRX

    As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.

  • Rethinking Third-party Cyber Risk Management

    Sponsored by: CyberGRX

    In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.

  • 15 Ways to Weed the Regulatory Violations Out of Your Spend

    Sponsored by: AppZen

    How can your organization secure a seamless spend audit? View this checklist to uncover 15 ways to weed regulatory violations out of all spend prior to disbursement, and get the tools you need to secure a seamless spend audit.

  • Hype Cycle for Privacy, 2019

    Sponsored by: TITUS

    Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.

  • The Titus Times: The CEO & CTO

    Sponsored by: TITUS

    In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.

  • State of the Web Report 2019

    Sponsored by: Tala Security

    The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.

  • Considerations for CuttingEdge Threat Intelligence & Incident Response

    Sponsored by: Farsight Security

    The use of a cyberthreat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.

  • Getting Started with DevSecOps

    Sponsored by: ZeroNorth

    Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    Sponsored by: ComputerWeekly.com

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

  • Making Application & Infrastructure Vulnerability Management More Effective

    Sponsored by: ZeroNorth

    Organizations are struggling to keep up with the dizzying pace it takes to roll out new software capabilities, which only deepens the challenge of keeping up with risks across applications and infrastructure. In this white paper, discover 5 steps you can take to help begin your Application and Infrastructure Vulnerability Management Program.

  • Protecting Your Organization from Password Breaches

    Sponsored by: OneLogin

    With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.