Search Results for: security

A 7-Step Risk Assessment Framework For Cybersecurity Professionals
Cybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.

VikingCloud

Driving Down IT Stack Complexity
What can organizations do to maintain momentum on their consolidation efforts? Read this guide to learn about common reasons for consolidation struggles, architectural qualities to look for in a consolidation platform, and success stories from other organizations that have consolidated effectively.

Cloudflare

Guiding Your Leadership Team Through the Zero Trust Mindset
Zero trust identifies users and entities and grants them just the right amount of access as needed. In this e-book, LATAM Field Technology Director at CyberArk, Cláudio Neiva, leverages his 24 years of experience to break down the essential elements of zero trust. Read on to learn more.

TOPICS: .NET
CyberArk

UPSTACK DIGEST Cybersecurity
This complimentary digest is filled with advice from UPSTACK experts in the trenches of today’s cyberwar.

TOPICS: .NET
Upstack, Inc.

What is Zero Trust?
This e-book, What is Zero Trust? (Really), teaches you exactly what Zero Trust really is. Dive into the e-book here.

TOPICS: .NET
Trend Micro

Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.

TechTarget ComputerWeekly.com

Accelerating Zero Trust Capabilities
The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.

TOPICS: .NET
Saviynt

A Strategic Approach to Maintaining PCI DSS 4.0 Compliance
"The shift to the cloud and to hybrid work made PCI compliance more complex in many ways. And with PCI DSS 4.0 rolling out, it is more essential than ever for organizations to find a way to streamline compliance.Download this whitepaper to learn about:

TOPICS: .NET
Cloudflare

Container technologies and trends: What enterprises need to know
In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.

TechTarget ComputerWeekly.com

RACI For SASE Success Optimizing Single-Vendor SASE Selection
The RACI matrix is a powerful project management tool you can use to optimize single-vendor SASE selection. It defines roles and responsibilities, fosters collaboration and aligns stakeholders. Read this e-book to learn how to apply the RACI matrix to your SASE project.

Cato Networks