Business Risk Analysis Reports

Top 11 cloud security challenges and how to combat them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

CW ANZ, July 2020: Expert Advice on Security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

User Behavior Analysis & SIEM
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

ITSM strategy for an agile, secure digital transformation
sponsored by TechTarget CIO
EBOOK: As digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
Posted: 22 May 2018 | Published: 22 May 2018

TechTarget CIO

How Prepared are Businesses for GDPR?
sponsored by Lynx Technology Partners
EGUIDE: According to a recent poll of 900 business decision-makers, 31% believe their organization is GDPR compliant, however experts found that only 2% actually appeared compliant. Computer Weekly's security editor, Warwick Ashford dives into GDPR head first and reveals where businesses stand in their journey to GDPR compliance.
Posted: 27 Feb 2018 | Published: 20 Feb 2018

Lynx Technology Partners

Facing up to emerging technology: Risks and benefits
sponsored by TechTarget CIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

TechTarget CIO

Top 4 mobile security threats and challenges for businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Mobile is quickly becoming one of the most used endpoints in the enterprise. However, there is a common misconception that mobile devices don't need protection, which is just not true. In this infographic, we put together four of the top mobile security threats, and steps IT organizations can take to protect these critical endpoints.
Posted: 22 Nov 2022 | Published: 22 Nov 2022

TechTarget ComputerWeekly.com

How to Make a SIEM System Comparison Before you Buy
sponsored by TechTarget Security
EBOOK: Considering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

TechTarget Security

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity