IT Risk Management Reports

Toughening up web and mobile application security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
sponsored by TechTarget ComputerWeekly.com
EZINE: Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
Posted: 14 Mar 2022 | Published: 16 Mar 2022

TechTarget ComputerWeekly.com

How To Continuously Improve Risk Management Within Leading Cybersecurity Programs
sponsored by AT&T Cybersecurity
WHITE PAPER: In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Risk Management
AT&T Cybersecurity

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

Object Storage 101
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
Posted: 08 Feb 2021 | Published: 07 Feb 2017

TechTarget ComputerWeekly.com

Threat Intelligence Evaluator's Guide
sponsored by AT&T Cybersecurity
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

The CIO's Guide to GDPR
sponsored by Lynx Technology Partners
EGUIDE: The key to GDPR is a sound approach to data protection across the organization. Access this e-guide to learn from security expert Ed Tucker about data protection preparedness in terms of the GDPR and other regulations.
Posted: 27 Feb 2018 | Published: 21 Feb 2018

Lynx Technology Partners

Facing up to emerging technology: Risks and benefits
sponsored by TechTarget CIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

TechTarget CIO

Expert Perspectives on Data Protection and GDPR Compliance
sponsored by CyberArk
EGUIDE: A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk