IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Recommendations for managing AI risks
Yellow whitepaper cover with two flying robots, with desktop computers inside their headswhitepaper
Whitepaper

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs
25 Apr 2022
How a platform approach to security monitoring initiatives adds value
Whitepaper cover with title on burgundy square graphicwhitepaper
Whitepaper

How a platform approach to security monitoring initiatives adds value

Integration, orchestration, analytics, automation, and the need for speed
1 Apr 2022
Improve security and compliance
Whitepaper cover with image of a shield with red outline, red numbers 1s & 0s, red cubes and white cloud outlineswhitepaper
Whitepaper

Improve security and compliance

Adopting an effective security and compliance risk management approach
8 Mar 2022
Modern governance: The how-to guide
Whitepaper cover with solid red vertical line, and the title and Diligent logowhitepaper
Whitepaper

Modern governance: The how-to guide

Equipping organisations with the right tools for business resilience
8 Dec 2021
Marsh McLennan reveals its cyber risk analytics center
Hand hovering over laptop with padlock graphic superimposed
risk management

Marsh McLennan reveals its cyber risk analytics center

The center combines the expertise of Marsh, Guy Carpenter, Mercer, and Oliver Wyman
15 Oct 2021
Six ways boards can step up support for cyber security
A corporate boardroom filled with empty chairs against a long table
Business strategy

Six ways boards can step up support for cyber security

Security is an enterprise-wide risk management concern, not merely an IT issue
22 Jul 2021
How to increase cyber resilience within your organisation
Cyber resilience for dummies - How to improve cyber resilience within your organisation - whitepaper from Mimecastwhitepaper
Whitepaper

How to increase cyber resilience within your organisation

Cyber resilience for dummies
15 Jul 2021
Digital transformation and addressing risk
security in either data protection or cyber security
risk management

Digital transformation and addressing risk

How has your organisation’s risk profile changed in recent years due to its digital transformation?
24 Mar 2021
Observability in 2020: A manifesto
whitepaper
risk management

Observability in 2020: A manifesto

Ten principles for observability success
24 Nov 2020
Leadership compass: Privileged Access Management
Priviledged Access Managenment whitepaperwhitepaper
risk management

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment
24 Nov 2020
Bigleaf Networks’ AI-powered feature translates network events into actionable risks
Bigleaf risk monitoring dashboard
risk

Bigleaf Networks’ AI-powered feature translates network events into actionable risks

AI-widget identifies risks triggered by a site and highlights only the top three with actionable solutions
9 Oct 2020
Digital Risk Report 2020
whitepaper
Whitepaper

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management
14 Feb 2020
Your guide to managing cloud transformation risk
whitepaper
cloud security

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks
11 Feb 2020
Micro Focus suffers shares slump amid revenue fears
Growing graph
Acquisition

Micro Focus suffers shares slump amid revenue fears

CEO Chris Hsu leaves as analyst points finger at HPE merger difficulties
19 Mar 2018
Apple and Cisco tempt businesses with cybersecurity discount
risk management

Apple and Cisco tempt businesses with cybersecurity discount

Kaspersky claims it sets a "worrying precedent" of insurance companies claiming to be better informed on security
6 Feb 2018
LinkedIn cannot block third-parties from data access
LinkedIn
business intelligence (BI)

LinkedIn cannot block third-parties from data access

The ruling may have implications for social media users wishing to control how their data is collected
15 Aug 2017
Read Google's five rules for human-friendly AI
public sector

Read Google's five rules for human-friendly AI

Google updates Asimov's Three Laws of Robotics for AI developers
22 Jun 2016
Microsoft targets .NET Core with new bug bounty rewards
Microsoft Sign
Security

Microsoft targets .NET Core with new bug bounty rewards

Redmond offers more cash prizes for sourcing errors in its upcoming web frameworks
8 Jun 2016
Man who 'deleted company with one line of code' admits hoax
Network & Internet

Man who 'deleted company with one line of code' admits hoax

Marco Masala admits the story was a viral marketing ploy
18 Apr 2016
Uber launches bug bounty programme with $10k prize
A red padlock with a binary code label surrounded by circuits.
Security

Uber launches bug bounty programme with $10k prize

Keen bug tracers will need to find five genuine bugs to receive their first payout
23 Mar 2016
‘Worst passwords’ list 2015 topped by 123456
Password label
Security

‘Worst passwords’ list 2015 topped by 123456

Annual list of most commonly used passwords included Star Wars-related terms
20 Jan 2016
Lumension takes the wraps off LEMSS 7.3
Security

Lumension takes the wraps off LEMSS 7.3

LEMSS 7.3 promises to protect against more pernicious attacks, such as RMI, says vendor.
25 Apr 2013
Cryptzone CEO gives his account of the events that led to
Deal torn up
Security

Cryptzone CEO gives his account of the events that led to

Security vendor's CEO denies challenges around acquisitions were factor in NETconsent's retreat.
7 Dec 2012