Managing Risk Reports

7 top predictive analytics use cases
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.
Posted: 22 Jan 2024 | Published: 23 Jan 2024

TechTarget ComputerWeekly.com

CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
sponsored by TechTarget ComputerWeekly.com
EZINE: Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
Posted: 14 Mar 2022 | Published: 16 Mar 2022

TechTarget ComputerWeekly.com

12 top enterprise risk management trends in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
Posted: 20 Mar 2023 | Published: 20 Mar 2023

TechTarget ComputerWeekly.com

Threat management: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
Posted: 08 Feb 2021 | Published: 25 Nov 2016

TechTarget ComputerWeekly.com

Royal Holloway: Driverless vehicle security for military applications
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

Infographic: Top 12 risk management skills
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.
Posted: 01 Nov 2021 | Published: 25 Oct 2021

TechTarget ComputerWeekly.com

How to Shrink Supply Chain Risk
sponsored by TechTarget
RESOURCE: The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
Posted: 02 Aug 2021 | Published: 29 May 2021

TechTarget

Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

What You SIEM is What You Get
sponsored by AT&T Cybersecurity
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity