Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022
|
|
|
2025-26 DCIG TOP 5 MODERN SDS BLOCK STORAGE SOLUTIONS
sponsored by StorPool
ANALYST REPORT:
This report evaluates 21 modern software-defined storage (SDS) block solutions, identifying the top 5 based on features like data protection, deployment options, and performance management. Read the full report now to learn how these SDS solutions can modernize your storage infrastructure.
Posted: 14 Nov 2024 | Published: 15 Nov 2024
|
|
|
A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
|
How Does Your Sales Development Program Measure Up?
sponsored by TechTarget
TECHTARGET MEDIA:
To understand the factors leading to poor SDR retention, TechTarget, Tenbound and RevOps Squared surveyed 218 sales leaders. Review the findings in this report, “How Does Your Sales Development Program Measure Up?”
Posted: 31 Aug 2023 | Published: 31 Aug 2023
|
|
|
The Frightening Realities of Your SDR Program ... and What to Do About Them
sponsored by TechTarget
EBOOK:
To compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.
Posted: 03 Dec 2021 | Published: 03 Dec 2021
|
|
|
Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018
|
|
|
A Short, Complete Guide to Intent Data for Sales and Marketing
sponsored by TechTarget
WHITE PAPER:
Dive into this TechTarget white paper to learn how you can accelerate your own journey with intent data – whatever stage you’re at.
Posted: 25 Mar 2023 | Published: 25 Mar 2023
|
|
|
Spotlight on the Middle East: Emerging IT economy
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We focus on how countries in the Middle East region are trying to diversify their economies away from oil revenues. We look at how Saudi Arabia is trying to create their own version of Silicon Valley, how Dubai is trying to incorporate bitcoin into the property sector and how the UAE is trying to harness the power of artificial intelligence.
Posted: 08 Feb 2021 | Published: 29 May 2018
|
|
|
Focus: Securing the cloud
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.
Posted: 08 Feb 2021 | Published: 27 Feb 2017
|
|
|
Spotlight on Benelux: A smart future
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we take a look at how smart living and working are shaping up to be two of the most important and beneficial aspects of the digital transformations happening in Benelux today. We discover how Dutch towns are planning on using IT to automate human and business activity and how the Port of Rotterdam is preparing for autonomous ships.
Posted: 08 Feb 2021 | Published: 29 May 2018
|
|
|
Top 10 Middle East stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.
Posted: 08 Feb 2021 | Published: 09 Jan 2019
|
|
|
TeamViewer Mobile Device Management
sponsored by TeamViewer
PRODUCT OVERVIEW:
Secure and manage your mobile device fleet with TeamViewer's comprehensive MDM solution. Enhance data security, ensure compliance, boost productivity, and reduce IT costs. Learn how this 360° MDM platform can help your business. Read the full Product Overview.
Posted: 15 Oct 2024 | Published: 16 Oct 2024
|
|
|
Top 10 enterprise IT in the Middle East stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Countries in the Middle East have become pioneers of the latest digital technologies and some of the articles featured by Computer Weekly this year evidence that. Here are Computer Weekly's top 10 enterprise IT in the Middle East stories of 2019.
Posted: 08 Feb 2021 | Published: 27 Dec 2019
|
|
|
Addressing the NIST Cybersecurity Framework 2.0 with the CyberArk Identity Security Platform
sponsored by CyberArk
WHITE PAPER:
Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.
Posted: 23 Aug 2024 | Published: 23 Aug 2024
|
|
|
Intent-Guided Multithreading Tactics That Work
sponsored by TechTarget
TECHTARGET MEDIA:
As buyers become more digital, sellers must evolve their tactics. This white paper explores using intent-guided multithreading to identify and engage buying teams earlier, accelerate opportunities, and deliver high-value meetings that drive pipeline. Read the full white paper to learn more.
Posted: 04 Sep 2024 | Published: 05 Sep 2024
|
|
|
Infographic: Comparing cloud database security
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
More data than ever before is being put into cloud-based storage repositories. Leading cloud providers offer an array of storage options, yet databases remain the most common choice in today's enterprises. Because databases are updated so frequently, it's important to review their security controls regularly.
Posted: 03 Nov 2021 | Published: 03 Nov 2021
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK:
NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022
|
|
|
How To Simplify The Complexity Of The Educational Campus
sponsored by TeamViewer
EBOOK:
Today’s campus is a vast ecosystem where an endless array of individuals, from students and faculty to administrative staff and visitors, must effectively coexist.
Posted: 23 Mar 2024 | Published: 23 Mar 2024
|
|
|
Unlocking the CFO’s Support
sponsored by GEM
WHITE PAPER:
To secure a recruiting CRM, show your CFO how it solves critical hiring challenges and delivers ROI through cost savings. Download this guide to build a CFO-proof business case for your recruiting CRM.
Posted: 12 Jun 2024 | Published: 20 Jun 2024
|
|
|
Focusing on the 3 Ps for ABM Revenue at Scale
sponsored by TechTarget
EBOOK:
In this e-book, “Focusing on the 3 Ps for ABM Revenue at Scale,” we discuss how you can implement ABM 2.0 to better inform your marketing efforts and meet your sales team’s needs.
Posted: 08 Feb 2021 | Published: 13 Jan 2021
|
|
|
TeamViewer Tensor Full Auditability
sponsored by TeamViewer
WHITE PAPER:
TeamViewer Tensor's auditability feature provides comprehensive reporting and audit trails, allowing IT managers to track user actions, data, sessions, and more. Learn how this solution ensures compliance with security protocols and internal requirements by reading the full white paper.
Posted: 10 Oct 2024 | Published: 10 Oct 2024
|
|
|
Maximizing Workforce Productivity Toolkit
sponsored by QGenda
INFOGRAPHIC:
As stakeholders at healthcare organizations work to maximize productivity, this toolkit can offer them actionable guidance. To unlock resources for clinical teams, managers, IT professionals and human resources, tap into the infographic.
Posted: 05 Nov 2024 | Published: 08 Nov 2024
|
|
|
CIO Trends #11: Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.
Posted: 08 Feb 2021 | Published: 04 Jan 2021
|
|
|
CIO Trends #11: Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.
Posted: 08 Feb 2021 | Published: 02 Jul 2020
|
|