Archiwum białych ksiąg

Najnowsze tematy:

Understanding the TSA Code of Practice and How BeyondTrust Can Help

Even those outside of the telecommunications world will have heard of the government’s instruction to remove providers such as Huawei from UK communications networks. What you may not know is that this forms part of a much broa...

Wyświetl białą księgę

Cybersecurity Insurance Checklist

The blistering pace and expanding scope of cyber threats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting...

Wyświetl listę kontrolną

Understanding ESG for Not-For-Profit and Public Sector Organisations

Environmental, social and governance initiatives, widely known as ESG, have made a huge impact in the corporate world, and ESG has immense implications for not-for-profit organisations (NFPOs) and public sector organisations (P...

Wyświetl białą księgę

Key Stats That Boards Need to Know

This infographic from BoardEffect takes a closer look at the true cost of cyber risk, ransomware, and attacks on nonprofits, and how Governance Technology can help nonprofit Boards establish a sound cybersecurity framework. Bo...

Wyświetl infografikę

Turn endless tasks into efficient meetings — and a more effective board

Checking schedules. Sending out agendas, surveys and minutes. Tracking progress and getting the next generation on board and up to speed. If you’re overseeing governance — or the organisation itself — this list never ends. And ...

Wyświetl kartę danych

How to Strengthen Your Organization's Last Line of Defense: Your Human Firewall

Social engineering attacks, in the form of phishing, BEC, and ransomware attacks are becoming ever more commonplace. The number of cyberattacks that start by manipulating a human into allowing access to protected systems or sen...

Obejrzyj materiał wideo

How to Strengthen Your Organization's Last Line of Defense: Your Human Firewall

Social engineering attacks, in the form of phishing, BEC, and ransomware attacks are becoming ever more commonplace. The number of cyberattacks that start by manipulating a human into allowing access to protected systems or sen...

Obejrzyj materiał wideo

Critical Considerations When Evaluating Security Awareness Training Vendors

The vendor landscape for security awareness training (SAT) is as diverse as it is innovative. This market has changed significantly over the past several years as CISOs and security leaders now seek to ensure that any SAT progr...

Wyświetl białą księgę

Critical Considerations When Evaluating Security Awareness Training Vendors

The vendor landscape for security awareness training (SAT) is as diverse as it is innovative. This market has changed significantly over the past several years as CISOs and security leaders now seek to ensure that any SAT progr...

Wyświetl białą księgę

Veeam Data Platform: Technical Deep Dive

Find out what’s new in Veeam Data Platform with this V12 Technical Demo video and: Keep your data safe with built-in security enhancements in V12 Learn to test and verify your backups Explore new repository options in V12 Revi...

Obejrzyj webinar na życzenie
Zapisz się do newslettera
Najważniejsze aktualności za darmo na Twojej skrzynce e-mail