Search Results for: security

The 2024 Technology Trends Report
This report is a powerful glimpse into the future of the changing IT landscape informed by insights gleaned from UPSTACK's leading technology experts.

TOPICS: .NET
Upstack, Inc.

Adopting DORA with XM Cyber Checklist
In this white paper, discover a 25-point checklist for adopting the Digital Operational Resilience Act (DORA).

TOPICS: .NET
XM Cyber

4 Benefits of Just-In-Time (JIT) Privilege
As the de facto authentication method for many enterprises, Active Directory (AD) is a consistent target for cybercriminals. Just-In-Time Privilege from One Identity is designed to protect within AD by removing access to those not currently using the privilege. Download this white paper to learn more about Just-In-Time Privilege.

TOPICS: .NET
One Identity

The complex environment facing financial services
Today, banks and insurers sell through digital channels while their customers interact digitally as well. As a result, financial services companies are the target of frequent and severe cyberattacks. In this report, learn about the scope and scale of the threat landscape and what this sector can do to gain visibility into their IT environments.

TOPICS: .NET
Tanium

Protecting the IT attack surface while advancing digital transformation
To survive and to thrive, organizations must continue innovating, launching new products and services, and optimizing old ones. As a result, every organization’s attack surface will continue to change and, likely, grow. Learn how business leaders can keep up with these changes in this latest technical deep dive from Tanium experts.

TOPICS: .NET
Tanium

CIO Trends #7: Benelux
In this e-guide we take a look at some of the challenges and opportunities facing CIOs. There are few more difficult challenges than those brought about by cybersecurity threats - find out why SMEs in the Netherlands are struggling with this. Also find out how united action in the Netherlands could help solve the huge problem of Ddos attacks.

TechTarget ComputerWeekly.com

Migrate From Centos Linux To a Cloud-Ready Operating System
This white paper details the benefits of migrating from CentOS Linux to Red Hat Enterprise Linux. According to IDC, compared to unpaid alternatives like CentOS Linux, Red Hat Enterprise Linux enables:32% more efficient IT infrastructure teams72% less unplanned downtime Learn more in this white paper.

TOPICS: .NET
Red Hat

Implementing GenAI: Use cases & challenges
The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.

TechTarget ComputerWeekly.com

Legacy PKI Migration
52% of the 2500 participants surveyed by the Ponemon Institute reported that their organizations have poor visibility of apps that rely on Public Key Infrastructure (PKI). Along with exploring that obstacle, this white paper considers other challenges that legacy PKI can pose. To unlock those insights and more, read on.

TOPICS: .NET
Venafi

Our Top 5 Vulnerable Open Source Components
Software dependencies can equal open-source vulnerabilities. To empower your developers in leveraging open-source components while mitigating risk, read this white paper. Inside, Sonatype evaluates the top 5 open-source components, their vulnerabilities, and remediation recommendations.

TOPICS: .NET
Sonatype