MicroScope - July-August 2024: Is it worth taking a risk?
sponsored by MicroScope
EZINE:
In this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI
Posted: 04 Jul 2024 | Published: 05 Jul 2024
|
|
|
12 top enterprise risk management trends in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
Posted: 20 Mar 2023 | Published: 20 Mar 2023
|
|
|
Step-by-step disaster recovery planning guide
sponsored by TechTarget ComputerWeekly.com
EBOOK:
IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
Posted: 29 Mar 2022 | Published: 29 Mar 2022
|
|
|
CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
sponsored by TechTarget ComputerWeekly.com
EZINE:
Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
Posted: 14 Mar 2022 | Published: 16 Mar 2022
|
|
|
Infographic: 5 questions to ask when creating a ransomware recovery plan
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
Posted: 25 Oct 2021 | Published: 25 Oct 2021
|
|
|
A Computer Weekly buyer's guide to managing paper processes
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
Posted: 12 Jul 2021 | Published: 12 Jul 2021
|
|
|
Royal Holloway: Driverless vehicle security for military applications
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 08 Feb 2021 | Published: 14 Jul 2020
|
|
|
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
Posted: 08 Feb 2021 | Published: 06 Jul 2020
|
|
|
Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 08 Feb 2021 | Published: 12 Sep 2017
|
|
|
Focus: how to avoid being hit by ransomware
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
Posted: 08 Feb 2021 | Published: 18 May 2017
|
|
|
Object Storage 101
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
Posted: 08 Feb 2021 | Published: 07 Feb 2017
|
|
|
Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017
|
|
|
Focus: Securing for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 08 Feb 2021 | Published: 10 Jan 2017
|
|
|
Global Risks Report 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 08 Feb 2021 | Published: 13 Jan 2017
|
|
|
Threat management: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
Posted: 08 Feb 2021 | Published: 25 Nov 2016
|
|
|
Disaster recovery and business continuity: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.
Posted: 08 Feb 2021 | Published: 31 Oct 2016
|
|
|
Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016
|
|
|
E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by Safestone Technologies
EBOOK:
This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 08 Mar 2011 | Published: 08 Mar 2011
|
|
|
Presentation Transcript: Be Prepared! Leverage SAP PLM to Navigate Through Uncertain Times
sponsored by SAP America, Inc.
PRESENTATION TRANSCRIPT:
Read this presentation transcript to learn the business value of PLM in an uncertain economy as well as significant trends in the PLM market. Explore SAP's approach to a new generation of product lifecycle management solutions that will help you remain or become a product and services leader.
Posted: 04 Aug 2009 | Published: 04 Aug 2009
|
|
|
The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability
sponsored by SAP America, Inc.
WHITE PAPER:
Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability.
Posted: 22 Jul 2009 | Published: 03 Jun 2009
|
|
|
Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE:
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009
|
|
|
eBook: Compliance for the Midmarket: Governance, Risk and Technology
sponsored by TechTarget CIO
EBOOK:
Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|
|
The Financial Close: Optimizing Performance and Driving Financial Excellence
sponsored by SAP America, Inc.
WHITE PAPER:
The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls
Posted: 05 Jun 2009 | Published: 02 Jun 2009
|
|
|
eBook: Understanding GRC
sponsored by TechTarget
EBOOK:
This in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.
Posted: 20 May 2009 | Published: 20 May 2009
|
|
|
Governance, Risk, Compliance: Policy Management - Methods and tools
sponsored by TechTarget Security
EBOOK:
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.
Posted: 08 May 2009 | Published: 08 May 2009
|
|