ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment White Papers

  • 12 top enterprise risk management trends in 2023

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

  • Step-by-step disaster recovery planning guide

    Sponsored by: TechTarget ComputerWeekly.com

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Sponsored by: TechTarget ComputerWeekly.com

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Sponsored by: TechTarget ComputerWeekly.com

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

  • A Computer Weekly buyer's guide to managing paper processes

    Sponsored by: TechTarget ComputerWeekly.com

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

  • Incident Management Handbook

    Sponsored by: Atlassian

    On-call can be, well, a bit stressful. Keeping services available and functioning 24/7 is a demanding process. With the right incident management tools at the ready, you can be more confident about incident resolution. This 71-pe guide is chock-full of insider tips and best practices for incident management. Read the guide here to get started.

  • STEP 2: A Guide to Setting Up Your Insider Threat Management Program

    Sponsored by: Proofpoint

    In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.

  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

    Sponsored by: Barracuda

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

  • Spear Phishing: Top Threats and Trends Vol. 1

    Sponsored by: Barracuda

    This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.

  • Royal Holloway: Driverless vehicle security for military applications

    Sponsored by: TechTarget ComputerWeekly.com

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • Focus: how to avoid being hit by ransomware

    Sponsored by: TechTarget ComputerWeekly.com

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • Object Storage 101

    Sponsored by: TechTarget ComputerWeekly.com

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

  • Are we trusting social networks too much?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Global Risks Report 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

  • Focus: Securing for the future

    Sponsored by: TechTarget ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Threat management: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell Technologies

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    Sponsored by: TechTarget Security

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

  • Methods for Preventing Hospital Ransomware Infections and Cyberattacks

    Sponsored by: Cisco Umbrella

    The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.