Infosecurity Reports

MicroScope E-Zine: January 2017
sponsored by MicroScope
EZINE: Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.
Posted: 08 Feb 2021 | Published: 04 Jan 2017

MicroScope

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

Judging MSSP Options With Care
sponsored by TechTarget Security
EBOOK: The managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

TechTarget Security

Understanding Big Data So You Can Act with Confidence
sponsored by IBM
WHITE PAPER: Ensuring your data is secure and trustworthy is paramount to harnessing the power of big data, but it's also a difficult task when you've got such a large volume and variety of information coming into the business. Unfortunately, traditional methods of governing and correcting often aren't applicable to big data -- so what can you do?
Posted: 24 Dec 2013 | Published: 31 Jul 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Ransomware Backup Protection Requires Comprehensive Approach
sponsored by TechTarget Data Backup
EBOOK: Read on to discover just how ransomware can infiltrate data backups, what organizations can do to best prepare for this new problem and general guidelines for better backup practices.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

TechTarget Data Backup

Facing up to emerging technology: Risks and benefits
sponsored by TechTarget CIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

TechTarget CIO

Setting the Stage for the Data Governance: A CIO's Guide
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM