ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • Computer Weekly - 5 November 2019: The benefits of API-first software development

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.

  • Advanced Data Protection for Midsize Enterprises

    Sponsored by: InteliSecure

    Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.

  • Accelerating Security Response

    Sponsored by: ServiceNow

    While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System

    Sponsored by: Claroty

    A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.

  • Enabling Effective Data Protection

    Sponsored by: InteliSecure

    Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.

  • TPCRM 101: A Guide for Beginners

    Sponsored by: CyberGRX

    As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.

  • Rethinking Third-party Cyber Risk Management

    Sponsored by: CyberGRX

    In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.

  • 15 Ways to Weed the Regulatory Violations Out of Your Spend

    Sponsored by: AppZen

    How can your organization secure a seamless spend audit? View this checklist to uncover 15 ways to weed regulatory violations out of all spend prior to disbursement, and get the tools you need to secure a seamless spend audit.

  • Hype Cycle for Privacy, 2019

    Sponsored by: TITUS

    Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.

  • The Titus Times: The CEO & CTO

    Sponsored by: TITUS

    In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.

  • State of the Web Report 2019

    Sponsored by: Tala Security

    The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.

  • Considerations for CuttingEdge Threat Intelligence & Incident Response

    Sponsored by: Farsight Security

    The use of a cyberthreat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.

  • 3 Steps to Managing Shadow IT

    Sponsored by: Cisco Umbrella

    In today's digital workplace, organizations, departments, and individual users are embracing the cloud and leveraging new apps at rapid speed. This makes it difficult for security leaders to track app use and ensure that proper protections are in place. In this white paper, uncover 3 steps to managing shadow IT.

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    Sponsored by: ComputerWeekly.com

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

  • Protection Inside and Outside the Office: The New State of Cybersecurity

    Sponsored by: Cisco Umbrella

    Download this infographic to explore key findings from the Enterprise Strategy Group's survey of 450 cybersecurity experts on their experience protecting a network without perimeters.

  • Protecting Your Organization from Password Breaches

    Sponsored by: OneLogin

    With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.

  • 5 Steps to Minimize Your Exposure to Ransomware Attacks

    Sponsored by: Centrify Corporation

    According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

  • The Anatomy of a Hack: Perception vs. Reality

    Sponsored by: Centrify Corporation

    There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.

  • Trend Report: Threats are Multiplying and Becoming More Sophisticated

    Sponsored by: Cisco Umbrella

    Despite all the buzz about security and staying prepared, malicious attackers are more audacious than ever. Download this research report to explore popular threats such as phishing, ransomware, cryptomining and more. Also, learn how Cisco Umbrella can help keep your organization secure as threat risks continue to escalate.

  • The Latest Trends in Data Cataloging for BI

    Sponsored by: Alation

    In this webinar, watch Dresner Advisory Service and Alation discuss the latest trends in data cataloging for BI. Learn about the latest findings from Dresner Advisory Services' second annual Data Catalog Market Study, and discover why 90% of respondents believe that data governance is critical to business success.

  • Agile Data Governance: A Bottom-Up Approach

    Sponsored by: Alation

    In this webinar with Malcolm Chisholm of First San Francisco Partners, and Aaron Kalb of Alation, learn best practices for implementing agile data governance and how a data catalog can support these initiatives.

  • Proofpoint Email Isolation

    Sponsored by: Proofpoint

    It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.

  • 7 Steps to Secure Your Supply Chain

    Sponsored by: RackTop Systems

    Supply chain security requires a multifaceted approach to protecting the checkpoints, assets and infrastructures involved with the production of a product. In this resource, explore 7 steps to securing your supply chain.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.