Risk Management White Papers
-
MicroScope - July-August 2024: Is it worth taking a risk?
Sponsored by: MicroScopeIn this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI
-
Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.
-
Traditional vs. enterprise risk management: How do they differ?
Sponsored by: TechTarget ComputerWeekly.comBusinesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.
-
12 top enterprise risk management trends in 2023
Sponsored by: TechTarget ComputerWeekly.comEnterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
-
Top 11 cloud security challenges and how to combat them
Sponsored by: TechTarget ComputerWeekly.comMany organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
-
7 top predictive analytics use cases
Sponsored by: TechTarget ComputerWeekly.comAcross industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.
-
12 API security best practices
Sponsored by: TechTarget ComputerWeekly.comAs more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
-
How do cybercriminals steal credit card information?
Sponsored by: TechTarget ComputerWeekly.comCybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
Computer Weekly – 5 July 2022: How to get the right level of cyber insurance
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.
-
Risk management is the beating heart of your cyber strategy
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
-
Step-by-step disaster recovery planning guide
Sponsored by: TechTarget ComputerWeekly.comIT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
-
CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
Sponsored by: TechTarget ComputerWeekly.comComo o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
-
Toughening up web and mobile application security
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
-
MITRE ATT&CK, a guide for businesses in 2022
Sponsored by: TechTarget ComputerWeekly.comMitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.
-
Infographic: Top 12 risk management skills
Sponsored by: TechTarget ComputerWeekly.comRisk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.
-
Infographic: 5 questions to ask when creating a ransomware recovery plan
Sponsored by: TechTarget ComputerWeekly.comCompanies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
-
How to Shrink Supply Chain Risk
Sponsored by: TechTargetThe SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
-
A Computer Weekly buyer's guide to managing paper processes
Sponsored by: TechTarget ComputerWeekly.comModern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
-
The CISO's guide to supply chain security
Sponsored by: TechTarget ComputerWeekly.comSupply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
-
CW Innovation Awards: SIA taps blockchain for loyalty app
Sponsored by: TechTarget ComputerWeekly.comIn this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
-
Chapter 1: Security and Risk Management
Sponsored by: McGraw HillIn this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
Sponsored by: TechTarget ComputerWeekly.comIn this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
-
IT/OT convergence is necessary, but not so simple
Sponsored by: TechTarget ComputerWeekly.comThis handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
-
CW ANZ, July 2020: Expert Advice on Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: TechTarget ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.