Assessing Risk White Papers

(View All Report Types)
Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER: This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 21 Feb 2014 | Published: 31 Dec 2012

IBM

A Premium on Efficiency: Midsize Manufacturers Confront the Obstacles to Growth
sponsored by SAP America, Inc.
WHITE PAPER: How do best-in-class midsize manufacturers continue to grow in a tough economy? This research report, conducted by EIU, outlines measures manufacturers implement to continue expanding even while coping with the strains of softening demand in key markets, rising input costs, and downward pressure on prices.
Posted: 07 Aug 2009 | Published: 07 Aug 2009

SAP America, Inc.

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Risk Never Sleeps: Managing Risk in an Uncertain World
sponsored by SunGard Availability Services
WHITE PAPER: IT professionals are increasingly responsible for doing more than just provisioning servers and maintaining applications – they are core players in the risk management process. Read this whitepaper to learn more.
Posted: 19 Aug 2010 | Published: 19 Aug 2010

SunGard Availability Services

Liquidity risk management; Assessing and planning for adverse events
sponsored by IBM
WHITE PAPER: This paper takes a close look at the factors involved in the recent crisis and the patterns that resulted in widespread liquidity problems. It also points to specific vulnerabilities faced by financial institutions currently, and highlights best practices for liquidity risk management
Posted: 30 Sep 2013 | Published: 30 Sep 2013

IBM

2010 Endpoint Risk Assessment: Internal Vulnerabilities
sponsored by Promisec
WHITE PAPER: This study will show you the most common security issues that were found and how they were dealt with by the various organizations.
Posted: 23 May 2011 | Published: 23 May 2011

Promisec

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects
sponsored by HCL Software
WHITE PAPER: This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool.
Posted: 20 Jun 2008 | Published: 13 Mar 2008

HCL Software

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva