Risk Management Research
-
IAM: Key to security and business success in the digital era
Sponsored by: TechTarget ComputerWeekly.comAs more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
-
Computer Weekly – 14 August 2018: Infrastructure under attack
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
-
Network Security: Spotlight on Australia/New Zealand
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
-
Computer Weekly – 30 January 2018: Davos debates global tech risks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
-
Facing up to emerging technology: Risks and benefits
Sponsored by: TechTarget CIOCutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
-
8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
Sponsored by: ServiceNowAutomating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.
-
6 Ways to Prevent Ransomware in Health IT
Sponsored by: Cisco UmbrellaWith so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
-
How to Make a SIEM System Comparison Before you Buy
Sponsored by: TechTarget SecurityConsidering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
-
ITSM strategy for an agile, secure digital transformation
Sponsored by: TechTarget CIOAs digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
-
Automation in Cybersecurity
Sponsored by: Juniper NetworksDuring his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.
-
The Security Benefits of DLP
Sponsored by: InteliSecureSecurity breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
-
The Right Track to GDPR Compliance
Sponsored by: Lynx Technology PartnersThe GDPR is creating a pivotal change in how organizations process personal data, and it's clear there are a few areas of misunderstanding surrounding the regulation. Explore this expert e-guide to get a better understanding of the GDPR.
-
The CIO's Guide to GDPR
Sponsored by: Lynx Technology PartnersThe key to GDPR is a sound approach to data protection across the organization. Access this e-guide to learn from security expert Ed Tucker about data protection preparedness in terms of the GDPR and other regulations.
-
How Prepared are Businesses for GDPR?
Sponsored by: Lynx Technology PartnersAccording to a recent poll of 900 business decision-makers, 31% believe their organization is GDPR compliant, however experts found that only 2% actually appeared compliant. Computer Weekly's security editor, Warwick Ashford dives into GDPR head first and reveals where businesses stand in their journey to GDPR compliance.
-
User Behavior Analysis & SIEM
Sponsored by: LogRhythm, Inc.In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
-
Endpoint Protection & Device Management
Sponsored by: SeqriteThe endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
-
The Security of Software Containers & Sandboxing
Sponsored by: CloudPassageSandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
-
Defense-In-Depth Security: Key to Keeping IT Safe
Sponsored by: TechTarget SecurityThe enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
-
How to update, automate your IR processes
Sponsored by: Booz Allen HamiltonIn the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
-
Buyer's Guide: Cybersecurity
Sponsored by: Palo Alto NetworksKeeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.
-
How Can Privileged Access Accounts Be Managed in Large Companies?
Sponsored by: One IdentityAccording to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
-
How can organizations get control over privileged identity management?
Sponsored by: One IdentityRecent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
-
Explore the latest enterprise mobile security technology
Sponsored by: TechTarget Mobile ComputingAs cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
-
PCI Compliance with Unified Security Management
Sponsored by: AT&T CybersecurityBecause organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
-
5 Steps to Implement & Maintain PCI DSS Compliance
Sponsored by: AT&T CybersecurityAchieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.