Managing Risk Reports

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Object Storage 101
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
Posted: 08 Feb 2021 | Published: 07 Feb 2017

TechTarget ComputerWeekly.com

How To Continuously Improve Risk Management Within Leading Cybersecurity Programs
sponsored by AT&T Cybersecurity
WHITE PAPER: In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Risk Management
AT&T Cybersecurity

Threat management: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
Posted: 08 Feb 2021 | Published: 25 Nov 2016

TechTarget ComputerWeekly.com

COVID-19 in APAC:Tech industry lessons & innovations
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.
Posted: 08 Feb 2021 | Published: 26 Mar 2020

TechTarget ComputerWeekly.com

12 top enterprise risk management trends in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
Posted: 20 Mar 2023 | Published: 20 Mar 2023

TechTarget ComputerWeekly.com

Methods for Preventing Hospital Ransomware Infections and Cyberattacks
sponsored by Cisco Umbrella
EGUIDE: The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.
Posted: 06 Feb 2017 | Published: 02 Feb 2017

Cisco Umbrella

Remote Work Best Practices Emphasize UC Collaboration Tools
sponsored by TATA Communications
EGUIDE: Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.
Posted: 06 Nov 2020 | Published: 04 Nov 2020

TATA Communications

Expert Perspectives on Data Protection and GDPR Compliance
sponsored by CyberArk
EGUIDE: A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk

How to update, automate your IR processes
sponsored by Booz Allen Hamilton
EGUIDE: In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Booz Allen Hamilton