Enterprise Risk Management Reports

Computer Weekly – 5 July 2022: How to get the right level of cyber insurance
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.
Posted: 04 Jul 2022 | Published: 05 Jul 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to managing paper processes
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

TechTarget ComputerWeekly.com

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 08 Feb 2021 | Published: 24 Nov 2020

TechTarget ComputerWeekly.com

IAM: Key to security and business success in the digital era
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 08 Feb 2021 | Published: 15 Nov 2018

TechTarget ComputerWeekly.com

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

CW Innovation Awards: SIA taps blockchain for loyalty app
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
Posted: 11 May 2021 | Published: 11 May 2021

TechTarget ComputerWeekly.com

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Automating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.
Posted: 01 Oct 2018 | Published: 07 Nov 2018

ServiceNow

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage