Search Results for: security

TechTarget's 2023 Purchase Process Study
TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

TechTarget

Chancellor Rishi Sunak listens to UK tech – Computer Weekly Downtime Upload podcast
In this episode of the Computer Weekly Downtime Upload podcast, CW editor in chief Bryan Glick joins Caroline Donnelly, Clare McDonald and Brian McKenna to discuss his fireside chat with Chancellor of the Exchequer Rishi Sunak at a high-level Treasury tech sector conference.

TechTarget ComputerWeekly.com

Recognizing lawsuits against manufacturers of pharmaceuticals and medical devices
Understanding the surge in litigation against drug and medical device manufacturers is crucial for navigating legal complexities and ensuring patient safety.

XtelligentMedia Healthcare

14 million patients impacted by breaches in healthcare data in 2024
Healthcare organizations remain top targets for cyberthreat actors, according to a SonicWall threat brief that explored trends in healthcare data breaches.

XtelligentMedia Healthcare

Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise
In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.

TechTarget ComputerWeekly.com

6 Core Principles for Establishing DevOps Security at Scale
Disjointed DevOps security systems and practices can slow down CI/CD pipelines, frustrate developers, and lead to risky workarounds. You and other security leaders know that DevOps needs a new approach to security. This eBook details 6 guiding principles for enabling DevOps security at scale. Download the DevOps security eBook here.

TOPICS: .NET
CyberArk

The Complete Secure Access Service Edge (SASE) Guide
This guide explores the Secure Access Service Edge (SASE) architecture, including how it differs from SD-WAN and security service edge (SSE). Learn about the benefits, challenges, and use cases of SASE to determine if it's the right choice for your organization. Read the full guide to understand this cloud-based network security model.

Fortinet, Inc.

Zero Trust Security for Cellular and Hybrid IoT Deployments
IoT devices are inherently simple, and as a result often lack the built-in security that they require. By leveraging the right zero trust solution, IT teams and organizations can ensure IoT devices are secured in a simple, highly scalable way, enhancing their overall security posture. Download this infographic to learn more.

TOPICS: .NET
Cradlepoint

How to Establish an Enterprise Grade Security Posture for Remote Connectivity
As the network perimeter expands, security must move with it. This e-book outlines a framework to establish an enterprise-grade security posture for remote connectivity, covering commitments, expectations, risks, and configurations. Read the full e-book to learn how to secure remote access and build user trust.

TeamViewer

GigaOm Radar for Domain Name System (DNS) Security
The domain name system (DNS) is essential yet vulnerable. This GigaOm Radar report examines 11 leading DNS security solutions, evaluating their capabilities to help you secure your network and mitigate DNS threats. Read the full report to find the right DNS security solution for your organization.

Cisco