Risk Assessment White Papers
-
12 top enterprise risk management trends in 2023
Sponsored by: TechTarget ComputerWeekly.comEnterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
-
Step-by-step disaster recovery planning guide
Sponsored by: TechTarget ComputerWeekly.comIT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
-
CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
Sponsored by: TechTarget ComputerWeekly.comComo o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
-
Infographic: 5 questions to ask when creating a ransomware recovery plan
Sponsored by: TechTarget ComputerWeekly.comCompanies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
-
A Computer Weekly buyer's guide to managing paper processes
Sponsored by: TechTarget ComputerWeekly.comModern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
-
Incident Management Handbook
Sponsored by: AtlassianOn-call can be, well, a bit stressful. Keeping services available and functioning 24/7 is a demanding process. With the right incident management tools at the ready, you can be more confident about incident resolution. This 71-pe guide is chock-full of insider tips and best practices for incident management. Read the guide here to get started.
-
STEP 2: A Guide to Setting Up Your Insider Threat Management Program
Sponsored by: ProofpointIn this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
-
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Sponsored by: BarracudaDownload this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
-
Spear Phishing: Top Threats and Trends Vol. 1
Sponsored by: BarracudaThis report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: TechTarget ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
Sponsored by: TechTarget ComputerWeekly.comCyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
Focus: how to avoid being hit by ransomware
Sponsored by: TechTarget ComputerWeekly.comIn this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
-
Object Storage 101
Sponsored by: TechTarget ComputerWeekly.comStandard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
-
Are we trusting social networks too much?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
Global Risks Report 2017
Sponsored by: TechTarget ComputerWeekly.comSociety is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
-
Focus: Securing for the future
Sponsored by: TechTarget ComputerWeekly.com2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
-
Threat management: Essential guide
Sponsored by: TechTarget ComputerWeekly.comSecurity is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
State and Local Governments Chart Their Path Toward Improved Digital Security
Sponsored by: Dell TechnologiesState and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
-
IT Security Challenges for State and Local Government IT Departments
Sponsored by: Dell TechnologiesToday's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
-
Ransomware Attacks: How to Get the Upper Hand
Sponsored by: Cisco UmbrellaThe rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
-
Cybersecurity: The Latest Battleground for MSPs
Sponsored by: SkOUTOur experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
-
Cyber-Risk Strategies and Models for a Post-Perimeter Age
Sponsored by: TechTarget SecurityIn our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
-
Risk Assessment: The Roles Vendors and Frameworks Play
Sponsored by: BitSightAssessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.
-
Methods for Preventing Hospital Ransomware Infections and Cyberattacks
Sponsored by: Cisco UmbrellaThe threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.