Enterprise Risk Management Reports

Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 22 Oct 2019

TechTarget ComputerWeekly.com

Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.
Posted: 22 Jan 2024 | Published: 23 Jan 2024

TechTarget ComputerWeekly.com

How To Continuously Improve Risk Management Within Leading Cybersecurity Programs
sponsored by AT&T Cybersecurity
WHITE PAPER: In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Risk Management
AT&T Cybersecurity

CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
sponsored by TechTarget ComputerWeekly.com
EZINE: Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
Posted: 14 Mar 2022 | Published: 16 Mar 2022

TechTarget ComputerWeekly.com

Threat management: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
Posted: 08 Feb 2021 | Published: 25 Nov 2016

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

SWIFT Security Controls to be Mandatory by 2018
sponsored by CyberArk
EGUIDE: Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk

Why Security in DevOps is Essential to Software Development
sponsored by TechTarget Security
EBOOK: What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

TechTarget Security

How to Make a SIEM System Comparison Before you Buy
sponsored by TechTarget Security
EBOOK: Considering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

TechTarget Security