Managing Risk Reports

CW ANZ, July 2020: Expert Advice on Security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Step-by-step disaster recovery planning guide
sponsored by TechTarget ComputerWeekly.com
EBOOK: IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
Posted: 29 Mar 2022 | Published: 29 Mar 2022

TechTarget ComputerWeekly.com

Network Security: Spotlight on Australia/New Zealand
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 08 Feb 2021 | Published: 21 Jun 2018

TechTarget ComputerWeekly.com

How Prepared are Businesses for GDPR?
sponsored by Lynx Technology Partners
EGUIDE: According to a recent poll of 900 business decision-makers, 31% believe their organization is GDPR compliant, however experts found that only 2% actually appeared compliant. Computer Weekly's security editor, Warwick Ashford dives into GDPR head first and reveals where businesses stand in their journey to GDPR compliance.
Posted: 27 Feb 2018 | Published: 20 Feb 2018

Lynx Technology Partners

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Remote Work Best Practices Emphasize UC Collaboration Tools
sponsored by TATA Communications
EGUIDE: Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.
Posted: 06 Nov 2020 | Published: 04 Nov 2020

TATA Communications

Privileged Account Security
sponsored by CyberArk
EGUIDE: 55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

ITSM strategy for an agile, secure digital transformation
sponsored by TechTarget CIO
EBOOK: As digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
Posted: 22 May 2018 | Published: 22 May 2018

TechTarget CIO

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Automating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

ServiceNow