Projects Business Security RisksWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Projects Business Security Risks returned the following results.
RSS What is RSS?
Related Categories

 •   Project Management Solutions
 •   Treasury / Cash / Risk Management
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Vulnerability Assessment
 •   Network Security
 •   Business Process Management (BPM)

Related Searches
 •   Company Projects
 •   Manual Projects Business
 •   Processing Projects Business Security
 •   Projects Business Frameworks
 •   Projects Business Methodology
 •   Projects Business Security Desktop
 •   Projects Business Security Statement
 •   Projects Lists
 •   Projects Print
 •   Terminal Projects Business
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Controlling Risk Through Software Code Governance by Coverity

July 26, 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

EIU Report: Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry by Oracle Corporation

January 31, 2011 - (Free Research)
This research report explains how to ensure long-term viability in the financial services industry by depending on your ability to invest wisely in projects, meet regulatory targets and avoid the costly and public failures that brought down so many other organizations in the financial services industry. 
(WHITE PAPER) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 27, 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 21, 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Implementing ITIL Using the PMBOK Guide in Four Repeatable Steps by Global Knowledge

January 2006 - (Free Research)
This white paper provides an overview of the PMBOK® and the key process areas and functions within the IT Infrastructure Library. 
(WHITE PAPER) READ ABSTRACT |

Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry by Oracle Corporation

February 2011 - (Free Research)
In this webcast, discover key findings from The Economist Intelligence Unit's new research paper, “Mitigating the Impact of Project Failure in the Financial Services Industry.” 
(WEBCAST) READ ABSTRACT |

Industry Analyst Reports - Getting in Front of IT Compliance and Risk Management by CA Technologies.

July 2010 - (Free Research)
Read this Forrester Consulting analyst report to find out about the trends in managing IT compliance and risk. This report discusses the result of an evaluation conducted by Forrester for CA Technologies. 
(ANALYST REPORT) READ ABSTRACT |

Security Pay Rates: UK Permanent Salary Index February 2013 by ComputerWeekly.com

February 2013 - (Free Research)
This research from Acumin and Computer Weekly charts the rate for the job for over 60 IT security and compliance roles. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly - 17 January 2012: featuring the future of IT education; G-Cloud in action; networking challenges by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the future of computer science education now the government has scrapped the current ICT curriculum, and what this means for the IT industry. We talk to an early adopter of the government G-Cloud plan; and we examine the key challenges for network architects. Download the new issue now. 
(EZINE)

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Enable Project-Centric Manufacturing with Business Software by IFS

June 2008 - (Free Research)
Project-centric manufacturing business models that involve outsourcing and short product lifecycles expose manufacturers to a number of risks they were not vulnerable to previously. 
(WHITE PAPER) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

Assess Virtualization Security Risk in Six Simple Steps by Intel

August 2011 - (Free Research)
There are several critical issues every security pro must consider when evaluating risk in virtual environments. This expert tip provides six simple steps to perform a virtualization security risk assessment and highlights key points to ease security integration as your virtualization project comes together. 
(EGUIDE) READ ABSTRACT |

Cisco Continuous Data Protection for Files by Cisco Systems, Inc.

March 2009 - (Free Research)
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software. 
(WHITE PAPER) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance by Intel

May 2011 - (Free Research)
In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Barclays Application Security Assurance Project by Veracode, Inc.

February 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Secure your data – protect your business by ComputerWeekly.com

November 2012 - (Free Research)
This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Managing Project and Portfolio Risk in the Oil and Gas Industry During an Economic Downturn by Oracle Corporation

March 2009 - (Free Research)
Project portfolio management solutions, such as those from Oracle, enable project leaders to successfully manage risk, even in this volatile climate. They also enable companies to identify the best strategies for pursuing existing projects and to identify the most-promising future projects for investment. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Solutions Brief: Oracle Solutions for Governance, Risk and Compliance by Oracle Corporation

October 2010 - (Free Research)
Read this white paper to learn about Oracle’s comprehensive GRC platform and how leading enterprises are turning to Oracle’s new platform to meet the demands of increasingly challenging regulatory mandates while continuing to innovate and grow their business. 
(WHITE PAPER) READ ABSTRACT |

Successfully Managing Programs and Risk in the Aerospace and Defense Industry by Oracle Corporation

February 2010 - (Free Research)
Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges. 
(WHITE PAPER) READ ABSTRACT |

Reducing risk through requirements-driven quality management: An end-to-end approach by Hewlett-Packard Company

February 2008 - (Free Research)
When IT initiates a project, the department makes a commitment to the business to ensure quality and success when it is deployed. Learn how requirements management helps IT quantify project risks and make informed decisions about resource allocation. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Risk Management in the Financial Services Industry: International Benchmark Survey May 2007 by SAS

September 2008 - (Free Research)
This report presents the 2007 results of SAS' annual international benchmark survey on enterprise risk management (ERM) in the financial services industry. 
(WHITE PAPER) READ ABSTRACT |

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension

November 2008 - (Free Research)
Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts