risks

Results 1 - 25 of 973Sort Results By: Published Date | Title | Company Name
Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust
Published By: KPMG     Published Date: Oct 15, 2019
Consumers have become more educated about the value of data and cyber risks associated with it. As consumer awareness increases so does their expectations of trust and digital security. Read now KPMG's report Trust in the time of disruption to understand the cybersecurity gap that exists between consumers and organisations, and what asset management and financial services firms as a whole can do to close the trust gap.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Businesses increasingly see cloud as the best route to enhanced agility and digital transformation. But this survey reveals that keeping the lid on cloud costs is far from straightforward. Read this report to discover: whether businesses are realising the benefits they anticipated from cloud migration how effective companies are at managing cloud investments the risks and consequences of getting locked into inefficient architectures.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
As businesses start to experiment with true artificial intelligence, safe delivery of AI demands a new risk and control framework. This report, designed for anyone tasked with the safe delivery of AI, proposes an effective solution. Read the report to find out: the risks associated with AI and the challenge of managing them a 17-category Risk & Controls framework for AI in-depth details for key categories, including security management, business continuity and knowledge management an essential glossary of AI terms.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Many organisations will be using AI sooner than anyone expects. Prepare now to address the risks from these advanced technologies with this comprehensive framework from our risk experts. Download this practical resource to see AI risk description, control topic and control description, COBIT process and COBIT area for 17 different AI risks.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: the ethical challenges and risks arising from the use of customer data how to start embedding principles for ethical data handling in your organisation the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Develop practical strategies for success and manage the risks associated with supply chain transformation. Read this insight to find out about: the digital solutions companies are using to reshape their supply chains the benefits they realise as a result how to identify opportunities for optimisation in your own supply chain which practical strategies to deploy for successful digital transformation.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organizations computing power to create cryptocurrencies like Bitcoin and Monero and generate profit for themselves. If youre not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook youll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Its no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of todays increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of todays increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Dont miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: Nozomi     Published Date: Oct 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: Rackspace - Google Cloud     Published Date: Jul 26, 2019
In todays digital world, technologies such as cloud have become commonplace to take digital transformation projects to the next level. But while cloud is critical to business transformation success, Australian IT decision-makers (ITDMs) still feel that the C-suite does not understand the time and complexity of the journey. This paper explores: Insights on challenges faced by Australian ITDMs when rolling out cloud projects The role of the ITDM today Key blockages IT stakeholders encounter when driving digital change, and; What they need from the business and wider technology ecosystem to navigate the risks associated with starting a cloud project or moving to a full cloud-first model.
Tags : 
    
Rackspace - Google Cloud
Published By: Datastax     Published Date: Sep 27, 2019
Consumers have extraordinarily high expectations of the online user experience, and stakes are at their highest around the holidays. Database infrastructure plays a huge role in holiday success (or failure!). In this eBook, you'll learn ways to evolve your infrastructure to break through five holiday database roadblocksby reducing stack complexity, improving uptime and elasticity, and smartly managing open source databases.
Tags : 
    
Datastax
Published By: Ricoh     Published Date: Sep 16, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. Stay ahead of your competitors Reduce operating costs and drive revenue Get your team on board with digital transformation Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. Stay ahead of your competitors Reduce operating costs and drive revenue Get your team on board with digital transformation Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. Stay ahead of your competitors Reduce operating costs and drive revenue Get your team on board with digital transformation Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. Stay ahead of your competitors Reduce operating costs and drive revenue Get your team on board with digital transformation Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. Stay ahead of your competitors Reduce operating costs and drive revenue Get your team on board with digital transformation Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
" Leaders can transform their organization, while reducing their risks and boosting their chances of success. Understand 3 Technologies that Improve Productivity, Communication and Collaboration."
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 18, 2019
Depending on the region, only 7% to 18% of organizations currently possess the digital dexterity to succeed with software and services requiring digitally enlightened workers - Gartner Leaders can transform their organization, while reducing their risks and boosting their chances of success. Understand 3 Technologies that Improve Productivity, Communication and Collaboration. Stay ahead of your competitors Reduce operating costs Leverage your print hardware investment to do more GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; Parsimonious, by using as few factors as possible; Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
    
Two Sigma
Published By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how its evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of dataso organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: 7 best practices for data privacy and security policies 7 items to consider for device security 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, its clear theres value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of medical device hijacking. Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.