Search Results for: security

Frost Radar : Managed Security Services in the Americas, 2024
Frost & Sullivan's analysis of the managed security services market in the Americas highlights the growth opportunities driven by the evolving threat landscape and the need for comprehensive security solutions. Read the full report to learn about leading providers and key market trends.

AT&T and LevelBlue

Extend Complete Data Security to the Public Cloud with DSPM
As cloud data breaches increase, traditional security approaches fall short. Zscaler's Data Security Posture Management (DSPM) solution provides comprehensive visibility, risk identification, and guided remediation to secure your cloud data. Read the full blog to learn how DSPM can solve your real cloud security challenges.

Zscaler

Stop breaches with privileged access security white paper
Today's privileged access security is critical to protect digital resources and users. Learn how to implement a modern identity security strategy, including Zero Trust principles, to reduce cyber risks. Read the white paper for more insights.

One Identity

Addressing Zero Trust for Government: The Role of Identity Security
As governments adopt Zero Trust, identity security is critical. This white paper explores the role of identity security in a Zero Trust architecture, including five key principles and six focus areas to get started. Learn how the CyberArk Identity Security Platform can help you implement a successful Zero Trust strategy.

Merlin International

Cortex extended security intelligence and automation management (XSIAM)
In the last few years, the needs of the security operations center (SOC) have changed, but the tools that they use have not. Extended security intelligence and automation management (XSIAM) uses a combination of automated and human-based controls to more rapidly and accurately remediate threats. Read on to learn more.

TOPICS: .NET
Palo Alto Networks

Leader’s Guide to Software Supply
Chain Security
The new Gartner report explores the three pillars of software supply chain security and how to address this critical risk. Download the report to learn how you can secure remote access and build user trust.

ReversingLabs

TBD
TBD

TechTarget

TechTarget's 2023 Purchase Process Study
TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

TechTarget

Chancellor Rishi Sunak listens to UK tech – Computer Weekly Downtime Upload podcast
In this episode of the Computer Weekly Downtime Upload podcast, CW editor in chief Bryan Glick joins Caroline Donnelly, Clare McDonald and Brian McKenna to discuss his fireside chat with Chancellor of the Exchequer Rishi Sunak at a high-level Treasury tech sector conference.

TechTarget ComputerWeekly.com

Recognizing lawsuits against manufacturers of pharmaceuticals and medical devices
Understanding the surge in litigation against drug and medical device manufacturers is crucial for navigating legal complexities and ensuring patient safety.

XtelligentMedia Healthcare