Search Results for: security

8 key characteristics of cloud computing
When it comes to building and deploying modern applications, companies rely on the cloud. From the ability to manage automation, costs, performance, compliance, and security, cloud provides flexibility that sets it apart from on-premises IT architectures. In this e-guide, explore the 8 key characteristics of cloud computing.

TechTarget ComputerWeekly.com

Practical Zero Trust Implementing Protections for High-Value Data
This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.

Zentera Systems Inc.

The Power of Native Cloud Detection and Response Services
As cloud infrastructure and apps evolve rapidly, security teams struggle to maintain visibility and response capabilities. This Enterprise Strategy Group Showcase explores native AWS detection and response services that can help close critical cloud security gaps, enabling earlier threat detection and faster mitigation. Read on now to learn more.

AWS & Elastic

How to Implement an OSS Governance Program
Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.

TOPICS: .NET
Anaconda

AI For Cyber Defense
For a deep dive on the relationship between AI and cyber defense, check out this 14-page e-book by SVP of Security Operations at CyberMaxx, Gary Monti.

CyberMaxx

How to get a better deal on cyber insurance through IAM
Cyber insurance is a key risk management tool, but obtaining favorable coverage requires a strong security posture. Learn how identity and access management (IAM) maturity can improve your cyber insurance terms and premiums. Read the full e-book to discover IAM best practices for securing better cyber insurance.

One Identity

Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography
In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.

TechTarget ComputerWeekly.com

Tape Archive Platform As-a-Service
This product overview explores Tape Archive Platform As-a-Service (TAPAS), a cloud-based solution from Spectra Logic and Geyser Data that delivers enterprise-class security, reliability, and sustainability for archiving data at scale. TAPAS offers easy provisioning, fast data retrieval, and enhanced data security. Read on now to learn more.

Spectra Logic

Buyer’s Guide to Unified SASE
When selecting a unified SASE solution, what requirements should you keep in mind? Along with answering that question, this 20-page buyer’s guide for unified SASE maps out key SASE use cases and questions to pose to vendors. Keep reading to unlock the insights in full.

TOPICS: .NET
Fortinet, Inc.

Tackling Cybersecurity and Mitigating Risk for Franchises
Managed Cybersecurity Services can help franchises protect their brand, customer data, and digital systems from cyber attacks. Learn how to secure remote access and build user trust by downloading this white paper.

Hughes Network Systems