Search Results for: security

What Is Application Security?
According to a recent report, 76% of all software applications have some sort of a security flaw. Applications are often seen as products in and of themselves, but when they are given sensitive information, it is important that they also be secure. Access the full infosheet to learn more about the current state of application security.

TOPICS: .NET
Veracode, Inc.

Email security: Never more important
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

TechTarget ComputerWeekly.com

CISO Success Stories: How security leaders are tackling evolving cyber threats
The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.

TechTarget ComputerWeekly.com

Top 10 cyber security stories of 2019
2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.

TechTarget ComputerWeekly.com

Business email compromise prevention tips
It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

TechTarget ComputerWeekly.com

What is Mobile Security? Understanding Mobile Device Security
Mobile security protects smartphones and other devices from threats like malware and data breaches. Learn about the importance of mobile endpoint security, common threats, and benefits of a comprehensive mobile security solution. Read the full blog post to understand how mobile security is a critical part of your organization's infrastructure.

JAMF

Converging Cloud Security With Enterprise Security Operations
In this white paper, TechTarget’s Enterprise Strategy Group (ESG) Practice Director, Melinda Marks, looks at bridging the gap between proactive and reactive security with the convergence of cloud security. Download the ESG white paper and see how unified cloud security and SecOps can lead to a more effective overall security strategy.

TOPICS: .NET
Google

Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.

TechTarget ComputerWeekly.com

MicroScope – January 2022: Squaring up to ransomware
In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

MicroScope