Search Results for: security

How Security Teams Are Solving Vault Sprawl With a Modern SaaS Solution
The importance of a centralized identity security program is vital for both human and machine identities. While other vaults and open-source tools have their merits, these on-premises tools often require costly skills and resources to host and maintain. Join this webinar to learn the benefits of centralizing your secrets management.

CyberArk

Inside-out Protection Strengthening Security in an AI-driven World
AI is transforming cybersecurity, enhancing threat detection and response while introducing new challenges. In this white paper, you'll learn how to harness AI's power while addressing risks like adversarial AI and the skills gap. Read on now to explore AI's impact on security strategies.

CBTS

Protect Against OWASP Top 10 Large Language Model Security Risks
In this white paper, you'll discover how to protect against OWASP Top 10 security risks in large language models (LLMs). It outlines mitigation strategies for vulnerabilities like prompt injection, insecure output handling, and more. Read on now to learn how you can stay ahead of threats.

Shakudo Inc.

12 API security best practices
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

TechTarget ComputerWeekly.com

Royal Holloway: An enhanced approach for USB security management
USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.

TechTarget ComputerWeekly.com

CW ANZ: Trend Watch – Security
With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

TechTarget ComputerWeekly.com

Network security in the post-pandemic era
In this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends.

TechTarget ComputerWeekly.com

Secure Your Environment and Eliminate Secrets Sprawl
As cyber threats continue to get more innovative and attack surfaces continue to expand, many organizations are looking for new ways that they can ensure their information stays safe. So, what can DevOps, security, and IT leaders do to keep up? Tune into this webinar to discover more.

TOPICS: .NET
Keeper Security Inc

Royal Holloway: Testing antivirus efficacy in Linux
Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.

TechTarget ComputerWeekly.com

Tech career guide: Cyber security
In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.

TechTarget ComputerWeekly.com