Business Risk Analysis Reports

Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.
Posted: 08 Feb 2021 | Published: 23 Jan 2017

TechTarget ComputerWeekly.com

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
sponsored by TechTarget ComputerWeekly.com
RESOURCE: Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
Posted: 08 Feb 2021 | Published: 06 Jul 2020

TechTarget ComputerWeekly.com

Infographic: 2019 IT Priorities - Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
Posted: 08 Feb 2021 | Published: 09 Jul 2019

TechTarget ComputerWeekly.com

Global Risks Report 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 08 Feb 2021 | Published: 13 Jan 2017

TechTarget ComputerWeekly.com

False cents of security: The price of being compromised
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 08 Feb 2021 | Published: 03 Jun 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to managing paper processes
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

TechTarget ComputerWeekly.com

Top 4 mobile security threats and challenges for businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Mobile is quickly becoming one of the most used endpoints in the enterprise. However, there is a common misconception that mobile devices don't need protection, which is just not true. In this infographic, we put together four of the top mobile security threats, and steps IT organizations can take to protect these critical endpoints.
Posted: 22 Nov 2022 | Published: 22 Nov 2022

TechTarget ComputerWeekly.com

What You SIEM is What You Get
sponsored by AT&T Cybersecurity
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

Automation in Cybersecurity
sponsored by Juniper Networks
EGUIDE: During his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.
Posted: 04 May 2018 | Published: 04 May 2018

Juniper Networks