RSS feed Get our RSS feed

News by Topic

risk management

Results 176 - 200 of 709Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : credential, bots, business, risk, management, security, cyberattacks
     Akamai Technologies Australia
By: IBM     Published Date: Aug 22, 2014
The ongoing processes of managing collateral, loan covenants and monitoring borrowers' financial condition are key to ensuring that banks are in the best position to minimize loss.
Tags : credit risk management, managing collateral, financial monitoring, risk analytics
     IBM
By: Tenable     Published Date: Aug 15, 2018
"What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale."
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
     Tenable
By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
     Tenable
By: Tenable     Published Date: Nov 06, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
     Tenable
By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
     Tenable
By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : cisco, nss, cyber, prevention, risk management, resilience, firewall, security
     Cisco
By: Cisco     Published Date: Dec 27, 2017
Among your primary responsibilities as a board member is providing advice on both business strategy and enterprise risk. A general understanding of risk management is essential when looking at cyber risk specifically. Ultimately, an enterprise should consider adding cybersecurity expertise to its board membership, but all members can benefit from increasing their understanding about how cyber risk affects corporate strategy and the overall enterprise risk profile. To provide effective strategic advice to company leadership on cyber risk, you must ask the right questions, including whether a company does ongoing cyber risk assessment and management, and how.
Tags : 
     Cisco
By: Bit9     Published Date: Mar 07, 2013
Download Bit9’s latest Threat Advisor and see how a trust-based security platform can help you protect your core IP.
Tags : security, risk management, cyber threats, security breaches, cyber espionage, nsa, intellectual property
     Bit9
By: Delta Risk     Published Date: Jun 07, 2016
Recent high profile, high impact cyber breaches at some of the largest financial institutions in the United States have highlighted the fact that boards of directors need to take an active role in the management of cyber risk. This Viewpoint offers the Delta Risk perspective on how boards should engage in the management of cyber security risks, stressing four priority activities.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     Delta Risk
By: CS Risk Management & Compliance Ltd     Published Date: Oct 15, 2010
This white paper gives some tips on how to manage data privacy and to prevent data breaches
Tags : data protection, dpa, security, it security, ico, data protection act
     CS Risk Management & Compliance Ltd
By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet
     McAfee
By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
     NAVEX Global
By: Wyng     Published Date: Jan 13, 2016
The explosion of User Generated Content, or UGC, has drastically shifted the way people interact with brands. And as brands turn to UGC in place of their brand produced content, there are new risks that come with the rewards. To help mitigate these potential legal issues, we have developed a guide with everything you need to know about rights management.
Tags : search marketing, email marketing, website development, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care
     Wyng
By: NAVEX Global     Published Date: Jul 17, 2017
Thirty percent of organisations expect to do more work through outside third parties in 2017. However, third parties are responsible for 75 percent of foreign bribery schemes, making these engagements rife with risks that can’t be ignored. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with outside business partners. The Definitive Guide to Third-Party Risk Management gives you insight, advice and examples to help your organisation recognise and address third-party risk.
Tags : assessments, workflow, overseer, documentation, organisation, writing, review, feedback
     NAVEX Global
By: NAVEX Global     Published Date: Dec 22, 2017
An effective third-party risk management programme is in your best interest. Not only can you more confidently engage with a growing network of vendors, suppliers, resellers and distributors; but when done effectively, you can have a positive impact on the effectiveness and efficiency of your broad ethics and compliance programme. NAVEX Global research has shown that organisations pursue strong ethics and compliance programmes for myriad reasons, but at the top is a desire to cultivate and maintain a culture of ethics and respect. A strong third-party risk management solution helps organisations realise that objective through engaging with third parties that abide by codes of conduct, that are transparent and communicative and that you can be proud to do business with.
Tags : third party risk management, third party risk, managing third parties, risk management, anti-bribery programme, compliance programme
     NAVEX Global
By: NAVEX Global     Published Date: Dec 07, 2017
The Definitive Guide to Third-Party Risk Management is a comprehensive resource full of insight, advice and examples to help organisations identify and address their third-party risk. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with third party business partners. It will also protect your organisation from the risks that third parties can present. This guide is divided into three main sections: PLAN, IMPLEMENT and MEASURE. In these sections you’ll find the information and tools you need to develop a risk-based strategy, define third-party risk and a standard due diligence process, implement continuous monitoring of third parties and identify areas in which you need to improve your programme’s effectiveness.
Tags : risk management, third – party risk, navex, safeguard, risk – based strategy
     NAVEX Global
By: NAVEX Global     Published Date: Apr 20, 2018
Learn everything you need to know about effectively managing your third party risk-from defining a due diligence process to creating risk-based strategy-in our comprehensive guide. What you'll learn: -How to define your goals and create a strategy -How to manage your third-party risk management programme -How to track and improve your programme's effectiveness
Tags : 
     NAVEX Global
By: CA Technologies EMEA     Published Date: Sep 07, 2018
To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing. In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever. Recorded Feb 5 2018 49 mins Presented by Steve Feloney, VP Product Management CA Technologies
Tags : continuous delivery, application delivery, testing, test data management
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 12, 2018
To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing. In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever. Recorded Feb 5 2018 49 mins Presented by Steve Feloney, VP Product Management CA Technologies
Tags : continuous delivery, application delivery, testing, test data management
     CA Technologies EMEA
By: Sponsored by HP and Intel®     Published Date: May 10, 2013
Cloud computing has emerged as one of the prevailing IT trends today. By providing greater levels of provisioning and automation, cloud computing can help organizations become more nimble, reduce operating costs, improve application performance, and better allocate their compute resources. It enables organizations to more flexibly scale their IT infrastructure while reducing the administrative burden on IT organizations. But IT departments determined to take advantage of these benefits are at risk of losing control of their infrastructure. Read this white paper to understand how the HP CloudSystem Matrix is an integrated IT infrastructure solution that meets this challenge head-on, enabling organizations to simplify their IT infrastructure, reduce their management burden, and streamline operating costs. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other count
Tags : delivering, cloud, integrated infrastructure, hp cloudsystems, operating costs, enabling organizations
     Sponsored by HP and Intel®
By: KPMG     Published Date: Jul 25, 2016
Can a better demand-driven supply chain positively impact the bottom line? The future belongs to the new customer. Customer experience is becoming undeniably more important, yet many companies lack responsive and agile supply chains that can continually adjust to fluctuating customer requirements. Read more.
Tags : supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain
     KPMG
By: KPMG     Published Date: Nov 07, 2016
Can a better demand-driven supply chain positively impact the bottom line? The future belongs to the new customer. Customer experience is becoming undeniably more important, yet many companies lack responsive and agile supply chains that can continually adjust to fluctuating customer requirements. Read more.
Tags : supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain
     KPMG
By: Datamatics     Published Date: Mar 02, 2011
Are you looking for a time and attendance system which maximizes workforce productivity while minimizing compliance risk? Sign up today and receive a no-obligation personalized demo from Datamatics, leaders in labor management automation since 1966.
Tags : datamatics, time, attendance, payroll costs, risk, compliance
     Datamatics
By: IBM     Published Date: Mar 30, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on-premises data with new third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : cloud security, electronic security, health care, security risk management, user authentication, cloud technology
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics