Application Of RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Application Of Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Treasury / Cash / Risk Management
 •   Security Monitoring
 •   Data Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Vulnerability Assessment
 •   Business Process Management (BPM)
 •   Network Security
 •   Application Management and Maintenance

Related Searches
 •   Application Advantages
 •   Application Of Arkansas
 •   Application Of Cases
 •   Application Of Intrastructures
 •   Application Of Risk Service
 •   Application Of Risk Specialist
 •   Application Of Risk Testing
 •   Application Regional
 •   Guide Application
 •   Office Application Of Risk
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Understanding the risks of mobile apps by Veracode, Inc.

May 11, 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 23, 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

Reducing Risk through Requirements-driven Quality Management: An End-to-end Approach by Hewlett-Packard Company

December 23, 2008 - (Free Research)
This white paper explains a structured way to manage requirements and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system. 
(WHITE PAPER) READ ABSTRACT |

The Application Usage and Risk Report by Palo Alto Networks

June 30, 2010 - (Free Research)
The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 11, 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

The Mobile App Top 10 Risks by Veracode, Inc.

February 15, 2011 - (Free Research)
This expert webcast reveals the top 10 mobile application risks facing organizations today. 
(WEBCAST) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 26, 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Delivering high quality applications faster with reduced risk & cost by IBM

September 02, 2011 - (Free Research)
Improve time to value and quality by reducing rework and cost through faster stakeholder consensus, increased productivity, better process automation, and anytime-anywhere decision support for application software. Download the paper for more information on delivering high quality applications faster with reduced risk & cost. 
(WHITE PAPER) READ ABSTRACT |

Software Quality Optimization: Business Transformation and Risk by IBM

March 10, 2009 - (Free Research)
Information technology is undergoing constant innovation. To keep pace, software development organizations need to release business-critical software in less time, but this increases risk and often results in compromised quality. So the question becomes: How can you save time and reduce costs without sacrificing quality? Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance by Oracle Corporation

May 11, 2011 - (Free Research)
When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Value with Oracle Governance, Risk & Compliance by Oracle Corporation

October 01, 2010 - (Free Research)
In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients. 
(WHITE PAPER) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 23, 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 01, 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

How to Beat the Cost of Compliance by Optimizing your Data Across its Lifecycle with IBM System z® by IBM

March 01, 2011 - (Free Research)
In this webcast you’ll learn how to lower costs through optimizing your organization’s data, thereby improving the efficiency of your business processes and applications. With intelligent archiving and thorough backup-and-restore strategies, you can further reduce costs and risks to your business. 
(WEBCAST)

Harnessing Oracle Governance, Risk, and Compliance Applications to Improve Your PeopleSoft 9.1 Upgrade by Oracle Corporation

July 01, 2010 - (Free Research)
This paper explains how the Oracle Governance, Risk, and Compliance (GRC) applications suite may be leveraged to streamline your upgrade to PeopleSoft 9.1, while building an enterprise GRC platform that helps realize operating efficiencies, transparency, and sustainable compliance and risk management well into the future. 
(WHITE PAPER) READ ABSTRACT |

GRC Solutions from itelligence: Balance Risk And Opportunity With A Practical Approach to GRC by itelligence, Inc.

May 15, 2013 - (Free Research)
To keep pace in today's constantly evolving regulatory environment, you need a comprehensive governance, risk, and compliance (GRC) system. This brief white paper highlights how the right GRC strategy can help you standardize business process and increase control over compliance issues. 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report by Veracode, Inc.

February 28, 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

Holistic risk management: Perspectives for IT professionals by IBM

October 16, 2012 - (Free Research)
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: March 2009 - Sky-High Risk? by Information Security Magazine

March 20, 2009 - (Free Research)
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more. 
(EZINE)

Using application control to reduce risk with endpoint security by Sophos, Inc.

July 19, 2011 - (Free Research)
Unauthorized applications should be a prime consideration for applying application control, as it increases the risk of malware infections and data loss. View this paper to explore how integrating application control with endpoint solutions can provide the most efficient and comprehensive defense against unwanted applications. 
(WHITE PAPER) READ ABSTRACT |

Data Discovery and Risk in the Datacenter by Tizor

October 2008 - (Free Research)
Learn how database activity monitoring (DAM) solutions mitigate data risk by discovering critical data in the data center, monitoring and analyzing activity, providing detailed auditing trails, and reporting on all user access. 
(WHITE PAPER) READ ABSTRACT |

Critical Technologies for Compliance and Risk Management by Siperian, Inc.

February 2009 - (Free Research)
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines. 
(WHITE PAPER) READ ABSTRACT |

Managing data and application security risks cost effectively by IBM

October 2009 - (Free Research)
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit. 
(WHITE PAPER) READ ABSTRACT |

The evolving roles of IT Managers and CIOs. Findings from the 2010 Global IT Risk Study by IBM

May 2011 - (Free Research)
This overview of the 2010 IBM Global IT Risk Study uncovers the challenges associated with IT risk, and the steps IT managers and CIOs are taking to better understand, confront and resolve this concern. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts