ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Cloud Security Analytics and Policy Management

    Sponsored by: Fortinet, Inc.

    When it comes to securing public cloud resources, integration of security controls helps organizations protect data, prevent intrusions, fight threats, and satisfy auditors. Discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.

  • Best Practices for Data Privacy Programs

    Sponsored by: Ionic Security

    Data Privacy – it’s on everyone’s mind. Privacy professionals are left overwhelmed. Companies don’t know where to turn. Luckily, this guide will walk you through privacy programs and how to segment and prioritize different best practices and technologies that support the scale of your business. Read on to get started.

  • Supporting Cybersecurity & Privacy Standards with ITAM

    Sponsored by: Snow Software

    Cybersecurity is now a priority across the entire business, from the board-level down as companies increasingly rely on operating models that require data sharing. With company reputations hanging in the balance, it’s essential that organizations align their policies around data handling and cybersecurity. Read on to learn more.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • 2019 True Cost of Fraud Study

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study explores the evolution, expansion and cost of fraud to deliver insights and recommendations on how to effectively sustain your business, successfully manage fraud risks and strengthen customer trust and loyalty. Download the report to explore key findings.

  • Accelerating Security Response

    Sponsored by: ServiceNow

    While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.

  • Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In

    Sponsored by: LexisNexis® Risk Solutions

    The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.

  • Cybercrime Networks: How Businesses Can Join Forces to Beat Fraudsters

    Sponsored by: LexisNexis® Risk Solutions

    Just because businesses are hardening their defenses against cybercrime, doesn’t mean fraudsters are giving up. Instead, they’re getting smarter — and taking a much more collaborative approach. In this resource, learn how businesses can join together to defend against fraud.

  • LexisNexis Risk Solutions 2019 True Cost of Fraud Study E-commerce/Retail Report

    Sponsored by: LexisNexis® Risk Solutions

    This research provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants (retail and online/mobile) should be aware of as they add new payment mechanisms and expand channels into online, mobile, and international sectors.

  • SaltStack: SecOps

    Sponsored by: SaltStack

    By changing how organizations approach specific problems, much of the pain in IT operations they currently endure can be removed allowing them to be more effective, efficient, and secure. In this white paper, learn about SaltStack SecOps which aims to help IT professionals use intelligent automation to secure and manage their IT environment.

  • IT and Security Working Better Together

    Sponsored by: ServiceNow

    With cyber exposure gaps continuing to increase, organizations need to up their vulnerability management strategy to resolve the most critical vulnerability first, reducing the risk window and potential exposure. Dive into this brief to learn how Optiv, ServiceNow, and Tenable are working together.

  • True Cost of Fraud Webinar

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.

  • Evaluating Vulnerability Risk Management Providers

    Sponsored by: Rapid7

    As vulnerability risk management evolves to address customers’ needs, this Forrester Wave seeks to highlight solutions that help customers prioritize remediation efforts. In the report, explore an evaluation of 13 vulnerability risk management providers.

  • IBM Security Guardium Analyzer Data Sheet

    Sponsored by: IBM

    In today’s digital world, data is our most complex and critical asset. It runs our businesses making it not only crucial to the organizations that store it, but also a high value target to malicious actors. In this brief, learn how IBM Security Guardium Analyzer can help organizations get started on their data security and compliance journeys.

  • IBM Security Guardium Analyzer Data Sheet

    Sponsored by: IBM

    In today’s digital world, data is our most complex and critical asset. It runs our businesses making it not only crucial to the organizations that store it, but also a high value target to malicious actors. In this brief, learn how IBM Security Guardium Analyzer can help organizations get started on their data security and compliance journeys.

  • From readiness to transformation: How to address privacy regulations and keep your data safe

    Sponsored by: IBM

    This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes

  • From readiness to transformation: How to address privacy regulations and keep your data safe

    Sponsored by: IBM

    This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes

  • The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

    Sponsored by: IBM

    This Forrest Wave report can help you understand and assess the data security solution landscape, and how these solutions can address your business and technology challenges. Read on for an analysis of 13 data security vendors and find out which vendors are leading the pack.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • Critical Watch Report: 2019

    Sponsored by: Alert Logic

    SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.

  • Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Sponsored by: HackerOne

    Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.

  • Weighing the Risks: The Real Costs of a Data Breach

    Sponsored by: Citrix

    Work has moved beyond office walls, and attackers are adapting. Defending against the attacks of today with yesterday’s tools and techniques can’t keep your systems and data secure. Download this infographic to learn how you can reduce risk and boost productivity with Citrix Workspace.

  • Penetration Testing: Protect Critical Assets Using an Attacker’s Mindset

    Sponsored by: IBM

    The proliferation of financial losses and brand damage stemming from security breaches means organizations need to be proactive in protecting their most valued assets. In this white paper, learn how IBM X-Force Red penetration testing services can help your organization identify and fix critical vulnerabilities before criminals exploit them.

  • The Practical Executive's Guide to Data Loss Prevention

    Sponsored by: Forcepoint

    As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.