Business Risk Analysis Reports

A Computer Weekly buyer's guide to managing paper processes
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

TechTarget ComputerWeekly.com

12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

CW Innovation Awards: SIA taps blockchain for loyalty app
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
Posted: 11 May 2021 | Published: 11 May 2021

TechTarget ComputerWeekly.com

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

Endpoint Protection & Device Management
sponsored by Seqrite
EGUIDE: The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
Posted: 30 Jan 2018 | Published: 24 Jan 2018

Seqrite

SWIFT Security Controls to be Mandatory by 2018
sponsored by CyberArk
EGUIDE: Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk

The CIO's Guide to GDPR
sponsored by Lynx Technology Partners
EGUIDE: The key to GDPR is a sound approach to data protection across the organization. Access this e-guide to learn from security expert Ed Tucker about data protection preparedness in terms of the GDPR and other regulations.
Posted: 27 Feb 2018 | Published: 21 Feb 2018

Lynx Technology Partners

Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises
sponsored by A10 Networks
EGUIDE: Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Facing up to emerging technology: Risks and benefits
sponsored by TechTarget CIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

TechTarget CIO

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity