Search Results for: security

Managing the invisible risk of non-human identities
As non-human identities (NHIs) proliferate, securing them is critical to avoid breaches and compliance issues. This white paper outlines the risks of unsecured NHIs and best practices for managing them, including identity discovery, risk assessment, and privileged access controls. Learn how to gain visibility and control over your NHIs.

One Identity

Design Update Capabilities for Medical Devices
Designing secure, reliable software update capabilities is crucial for medical devices to meet evolving regulatory requirements and improve patient safety. Learn how Wind River's virtualization, real-time OS, and cloud-native solutions can help you build in these critical update capabilities. Read the white paper.

Wind River

Enabling business growth with modern, standardized technology for leading provider of radiology and oncology solutions
Akumin, a leading provider of radiology and oncology services, partnered with Windstream Enterprise to implement a comprehensive suite of solutions including SD-WAN, cloud connectivity and managed security. This enabled Akumin to scale rapidly, enhance patient care and improve operational efficiency. Read the full case study to learn more.

Windstream Enterprise

MRO: Fleet Maintenance Solutions
Zebra Technologies offers fleet maintenance solutions to help military operations enhance efficiency, compliance, and real-time visibility. Improve security, parts tracking, documentation, and regulatory adherence to ensure mission readiness. Read the full application brief to discover Zebra's advanced fleet management capabilities.

Zebra Technologies

Generative AI Augments Marriott’s Cybersecurity Posture with AWS Partners Deloitte and Palo Alto Networks
Marriott's CISO leverages partnerships with AWS, Deloitte, and Palo Alto Networks to enhance cybersecurity using generative AI and machine learning. Their tri-party services provide an end-to-end platform that unifies business and security data to detect threats and enable quick response. Read the full blog post to learn more.

TOPICS: .NET
AWS

Podcast: The Computer Weekly Downtime Upload – Episode 32
In this week's episode of the Computer Weekly Downtime Upload podcast, Brian McKenna, Caroline Donnelly and Clare McDonald talk about Computer Weekly's diversity and inclusion event, Oracle Open World 2019, and government technology.

TechTarget ComputerWeekly.com

Embracing Reality: Managing Cybersecurity Breaches with Resilience
Cybersecurity breaches are inevitable, but organizations can build resilience to minimize their impact. Read this article to learn about proactive strategies, including incident response planning, continuous monitoring, and fostering a security-conscious culture.

CODEHUNTER

Zero-click two-factor authentication
Explore how zero-click two-factor authentication can enhance security and user experience for financial services. Learn about innovative solutions like Data Verification and Flash Call Verification that streamline authentication without compromising protection. Read the full guide to discover how these methods can transform your processes.

Sinch

Talking About a Revolution
To discover 6 components of a reimagined SOC, and to learn how you can harness those capabilities at your own organization, tap into this infographic by Palo Alto Networks.

TOPICS: .NET
Palo Alto Networks

Public Sector Leaders Discuss IT Infrastructure
In this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.

TOPICS: .NET
Red Hat