Search Results for: security

Comparing Azure Active Directory options
Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

TechTarget ComputerWeekly.com

Path to Resilience Building a Modern Security Program
Today’s SOC teams face a constellation of challenges. In this e-book, Splunk provides insights into how you can utilize SOC to solve these challenges and develop a unified approach to digital resilience. Read the e-book now to learn more.

TOPICS: .NET
Splunk

Best Practices for identity Access and Security Compliance
Zero trust network access (ZTNA) is a critical component and key player in the future of cybersecurity, and this white paper explores key best practices you can implement to optimize ZTNA and defend identities. Read on to learn more.

TOPICS: .NET
JAMF

Discover, Monitor, Manage and Secure SaaS Apps
To learn how to automate the discovery of SaaS applications, and to consider how doing so has benefited organizations like Braden Business Systems and Brightworks Group, download this overview.

TOPICS: .NET
Auvik Networks, Inc.

Secure remote access: More vital than ever thanks to Covid-19
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

TechTarget ComputerWeekly.com

CW EMEA - May 2023: The future of work
In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.

TechTarget ComputerWeekly.com

Cloud computing storage key management
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

TechTarget ComputerWeekly.com

Computer Weekly – 1 October 2019: The most influential women in UK technology
In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

TechTarget ComputerWeekly.com

Video: IT Priorities 2023 APAC
Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.

TechTarget ComputerWeekly.com

Are we trusting social networks too much?
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

TechTarget ComputerWeekly.com