Search Results for: security

Video: IT Priorities 2023 APAC
Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.

TechTarget ComputerWeekly.com

Computer Weekly – 1 October 2019: The most influential women in UK technology
In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

TechTarget ComputerWeekly.com

Global Manufacturer Adopts Unified SASE as a Service to Secure User Access and Filter Network and Security Traffic All The Time from Anywhere
Lauridsen Group International, a global manufacturer, adopted Aryaka's Unified SASE to secure user access and filter network traffic across its 60+ locations. The solution reduced management complexity, cut costs, and enabled faster site deployments. Read the full case study to learn more.

Aryaka

Hull University Teaching Hospital Improves Workflows with Real-Time Visibility of Assets
To help address rising incidents of chronic illness, an ageing population, more expensive drugs and a shortage of clinical staff, Hull University Teaching Hospitals NHS Trust, looks to new technology and is seen as a pioneering and innovative healthcare provider. In this case study, discover why they turned to Zebra for a new technology need.

TOPICS: .NET
Zebra Technologies

Are we trusting social networks too much?
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

TechTarget ComputerWeekly.com

Trust Emerges as Cybersecurity Issue for 42% of Security Decision-Makers
With cyberattacks on the rise, trust in teams and technology is crucial. However, 42% of security leaders see a trust deficit as their biggest hurdle, a new survey showed. Some trust is also misplaced, with 66% of security leaders trusting employees to prevent cyberattacks more than their own teams. Download the article to read more.

XtelligentMedia Healthcare

Why insider threats in healthcare remain prevalent although security culture is improving
Verizon has seen a resurgence in healthcare security culture, despite declining insider threat breach rates. According to KnowBe4's Security Culture Report, suggesting that these gaps can increase cyber risk.

XtelligentMedia Healthcare

Establish cloud and on-prem privileged sessions, create tunnels, power zero-trust infrastructure access and secure remote database access without a VPN.
Secure remote access is critical for organizations today. Keeper Connection Manager provides an agentless, zero-trust solution with features like privileged access management, remote browser isolation, and secure database access. Learn more in the Product Overview.

Keeper Security Inc

Keeper Security Government Cloud KSGC password manager and privileged access manager is FedRAMP and StateRAMP Authorized and available in the AWS GovCloud.
Public sector organizations face growing cyber threats from weak passwords and credential breaches. Keeper Security Government Cloud offers a FedRAMP-authorized password manager and privileged access solution to improve security, compliance, and user experience. Read the data sheet to learn more.

Keeper Security Inc

Keeper Remote Browser Isolation Securely isolate web browsing activities from end-user devices, mitigating cybersecurity threats by hosting browsing sessions in a controlled remote environment
Keeper's Remote Browser Isolation mitigates cybersecurity threats by hosting browsing sessions in a controlled remote environment, without a VPN. Secure access, zero-knowledge security, and comprehensive auditing make compliance a breeze. Read the full data sheet to learn more.

Keeper Security Inc