Search Results for: Master

XM Cyber on Operationalizing the Continuous Threat Exposure Management (CTEM) Framework by Gartner®
Expanding attack surfaces strain traditional approaches to vulnerability management. To level up their vulnerability management, many organizations have adopted Continuous Threat Exposure Management (CTEM), a type of program that Gartner has unpacked in research reports. For a comprehensive introduction to CTEM, dig into this white paper.

TOPICS: .NET
XM Cyber

Email Nurture Revival
With so many moving parts—from email cadence and personalization to lead qualification and content creation—nurture can get complicated quickly. We understand nurture can be overwhelming but downloading this e-book will help. It breaks down the basic nurture concepts so you can build a successful strategy.

TOPICS: .NET
BrightTALK by TechTarget

MSSP Success Checklist
In a crowded landscape, how can a Managed Security Service Provider (MSSP) stand out and boost sales? With the right people, processes and tools, this white paper argues. To access a 17-point checklist for MSSP success, continue on.

TOPICS: .NET
AT&T and LevelBlue

MicroScope – May 2022: Charging at SME security challenges
With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working

MicroScope

The great IAM - time to modernise?
In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?

TechTarget ComputerWeekly.com

The changing role of the CIO
Read this e-guide on the changing role of the CIO to learn about the challenges and opportunities facing modern CIOs and the leadership skills they need to stay relevant in a digital age.

TechTarget ComputerWeekly.com

10 Steps to Enhance the Agility, Security and Performance of Active Directory
Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.

TOPICS: .NET
One Identity

The exploitation of flaws in the HTTPS protocol
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

TechTarget ComputerWeekly.com

Insuring the uninsurable: Is cyber insurance worth its salt?
This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

TechTarget ComputerWeekly.com

Cloud Application Integration
Many existing enterprise integration technologies are rigid, expensive to maintain, and too slow to respond to the requirements of your business. This white paper details Informatica’s Cloud Application Integration service, which offers a single, trusted solution to support any integration pattern, data set, or endpoint. Access it here.

TOPICS: .NET
Informatica