Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server
sponsored by Veritas
WHITE PAPER:
Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...
Posted: 19 Nov 2007 | Published: 01 Mar 2007
|
|
|
Five Things Your IT Resources Should Be Telling You - And Aren't
sponsored by Unisys
WHITE PAPER:
This whitepaper describes the types of information IT managers should expect to gain from leading-edge IT resource governance tools.
Posted: 22 Jan 2009 | Published: 22 Jan 2009
|
|
|
Perfecting Cyber Resilience
sponsored by Pure Storage
WHITE PAPER:
When it comes to improving cyber resilience, CISOs face a host of challenges, including balancing security and performance, managing proliferating IoT devices and more. Yet, the modern cyber landscape necessitates a modern CISO strategy. In this white paper, discover the 6 tenets that such a strategy comprises.
Posted: 14 Nov 2024 | Published: 15 Nov 2024
|
|
|
The CISO Guide to Ransomware Prevention
sponsored by Checkpoint Software Technologies
WHITE PAPER:
Over the last 5 years, ransomware attacks have increased by 13%, with the average cost exceeding $1.8 million per incident. This white paper presents a CISO’s guide to ransomware prevention, including insights from Check Point VP Security Engineering, Jeff Schwartz. Read on to learn more.
Posted: 10 May 2024 | Published: 10 May 2024
|
|
|
A CISO's Guide to AI in 2024
sponsored by Checkpoint Software Technologies
EBOOK:
While generative AI has garnered much attention, it only represents a fragment of the rapidly evolving AI landscape. Security teams have recognized the potential AI has to transform cybersecurity, highlighted by the 92% of organizations that intend to use AI and machine learning to support cyber security. Download this e-book to learn more.
Posted: 15 May 2024 | Published: 15 May 2024
|
|
|
The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021
|
|
|
From The Trenches: A CISO's Guide To Threat Intelligence
sponsored by Zscaler
BLOG:
Threat intelligence gives CISOs critical insights to proactively defend against evolving cyber threats. This guide explores how to build an effective threat intelligence program, leverage standardized sharing formats, and transform security from reactive to proactive. Read the full article to learn more.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
The Ciso’s Guide To The Roi Of Cybersecurity
sponsored by Arkose Labs
EBOOK:
Facing increased scrutiny and cyberthreats, CISOs can explore 5 ways to show bot management ROI in this e-book. Learn to quantify savings from less downtime, breaches, reputational harm, and revenue loss. Download to justify investing in modern bot management.
Posted: 16 Jul 2024 | Published: 16 Jul 2024
|
|
|
5 Security Concerns for CISOs and How to Address Them
sponsored by Palo Alto Networks
WHITE PAPER:
This white paper explores 5 key security concerns for CISOs, including supply chain attacks, cloud security, and overloaded security teams. Get expert guidance on how to address these issues and prepare your organization for evolving cyberthreats. Read the full white paper to learn more.
Posted: 08 Nov 2024 | Published: 08 Nov 2024
|
|
|
The Changing Role Of The CISO Today’s Chief Information Security Officer (CISO) Is An Architect And Business Leader.
sponsored by Checkpoint Software Technologies
ANALYST REPORT:
Due to the growing importance of cybersecurity for overall business strategy and success, the role of the CISO is evolving. In order to understand this change, IDC conducted a survey of 847 decision makers across a variety of tech and cybersecurity products. Download the report now to unlock the findings.
Posted: 14 May 2024 | Published: 14 May 2024
|
|
|
Getting Cloud Security Right
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
Posted: 08 Feb 2021 | Published: 11 May 2020
|
|
|
A CISO's Guide to Cyber Security in Action (2023)
sponsored by Checkpoint Software Technologies
WHITE PAPER:
Emerging threats are forcing security teams to evolve by adopting and adapting new technologies, putting tremendous pressure on CISOs. This white paper presents a guide to help CISOs navigate the challenges of today’s security landscape. Read on to learn more.
Posted: 17 May 2024 | Published: 17 May 2024
|
|
|
Untethered: How CIOs & CISOs Are Paving the Way for the New Hybrid Workforce
sponsored by Zscaler
RESEARCH CONTENT:
This in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.
Posted: 13 Aug 2024 | Published: 20 Aug 2024
|
|
|
The Healthcare CISO’s Medical IoT Security Guide
sponsored by Palo Alto Networks
EBOOK:
Over the past few years, the healthcare industry has seen a surge in the use of connected medical devices. However, the more devices a healthcare organization deploys and connects, the bigger their attack surface becomes, putting confidential health data at risk. Read on to learn how to overcome the risk exposure of medical IoT devices.
Posted: 08 Nov 2023 | Published: 08 Nov 2023
|
|
|
Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022
|
|
|
Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Apr 2020
|
|
|
30-60-90-Day CISO: Mastering the IT Security Game
sponsored by Cato Networks
EBOOK:
Whether you're a new CISO, aspiring to the role or simply looking for a refresher, this eBook spells out critical steps to master in your first 30-60-90 days on the job. Gain insights to secure your organization and build trust as a security leader. Read the full e-book to get started.
Posted: 12 Dec 2024 | Published: 13 Dec 2024
|
|
|
Computer Weekly - 10 September 2024: The flight to data success
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how Manchester Airport Group has set course to become the world's most intelligent airport through its data-led approach. We also look at failings of AI initiatives as the tech hits roadblocks, as well as take a peak at what support networks are available to those new in the CISO role. Read the issue now.
Posted: 09 Sep 2024 | Published: 10 Sep 2024
|
|
|
CISO Success Stories: How security leaders are tackling evolving cyber threats
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
Posted: 18 Jan 2024 | Published: 19 Jan 2024
|
|
|
Computer Weekly – 25 August 2020: When algorithms don't play fair
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Aug 2020
|
|
|
Unified Risk Posture: A CISO’s Guide to Reducing Risk and Complexity
sponsored by Cloudflare
EBOOK:
Dieser CISO-Leitfaden beschreibt einen einfacheren Ansatz, der die wichtigsten Phasen des Managements der Risikoposition auf einer einzigen Plattform vereint. Dieser einheitliche Ansatz ermöglicht es Ihnen, Risiken dynamisch zu bewerten, Risikosignale auszutauschen und Kontrollen in sich entwickelnden IT-Umgebungen durchzusetzen.
Posted: 26 Sep 2024 | Published: 26 Sep 2024
|
|
|
Unified Risk Posture: A CISO’s Guide To Reducing Risk And Complexity
sponsored by Cloudflare
WHITE PAPER:
As cybersecurity risks expand, CISOs need a unified approach to evaluate, exchange, and enforce risk posture across users, apps, and data. Learn how to simplify risk management and optimize security investments in this e-book.
Posted: 13 Jul 2024 | Published: 13 Jul 2024
|
|
|
The Future of SASE: What's Next for CIOs and CISOs - Webinar with Gartner’s Neil MacDonald
sponsored by Cato Networks
WEBCAST:
What does the future of SASE hold for CIOs and CISOs? Access insights in this webcast, which features Distinguished VP Analyst at Gartner, Neil MacDonald, and VP of Product Marketing and Strategic Alliances at Cato Networks, Eyal Webber-Zvik.
Posted: 03 Apr 2024 | Premiered: Apr 3, 2024
|
|
|
Securing Your IT Assets: A CISO’s Checklist for Software Escrow in Supply Chain Management
sponsored by NCC Group
WHITE PAPER:
As a CISO, securing your software supply chain is critical. This e-book provides a 7-step checklist to help you identify critical dependencies, assess vendor security, establish escrow agreements, and develop contingency plans. Learn how software escrow can protect your digital assets and ensure business continuity. Read the full e-book.
Posted: 12 Dec 2024 | Published: 12 Dec 2024
|
|
|
Beyond the Firewall
sponsored by Pure Storage
WHITE PAPER:
This white paper uncovers insights from leading CISOs on today's top security challenges, including third-party breaches, resource constraints, and evolving attack tactics. Inside, you'll find out how CISOs can build more resilient, responsive security strategies. Read on now to learn more.
Posted: 21 Jun 2024 | Published: 21 Jun 2024
|
|
|
2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Cybersecurity resilience in an era of identity sprawl
sponsored by One Identity
WHITE PAPER:
As a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.
Posted: 12 Jun 2024 | Published: 12 Jun 2024
|
|