Loss Management Reports

12 top enterprise risk management trends in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
Posted: 20 Mar 2023 | Published: 20 Mar 2023

TechTarget ComputerWeekly.com

Computer Weekly – 30 January 2018: Davos debates global tech risks
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Jan 2018

TechTarget ComputerWeekly.com

Guide to business continuity planning during COVID-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.
Posted: 08 Feb 2021 | Published: 25 Mar 2020

TechTarget ComputerWeekly.com

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Traditional vs. enterprise risk management: How do they differ?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.
Posted: 29 Jun 2023 | Published: 29 Jun 2023

TechTarget ComputerWeekly.com

IT Priorities 2020: APAC
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.
Posted: 08 Feb 2021 | Published: 17 Mar 2020

TechTarget ComputerWeekly.com

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella