Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER:
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009
|
|
|
Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER:
This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007
|
|
|
Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK:
The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024
|
|
|
CMMC 2.0 for MSPs: Everything You Need To Know
sponsored by Scalepad Software
WHITE PAPER:
The Cybersecurity Maturity Model Certification (CMMC) framework is designed to support and guide MSPs working with the US Department of Defense. This white paper presents a guide to the CMMC, breaking down the essential information so that you can navigate its more complex features. Read on to learn more.
Posted: 15 Apr 2024 | Published: 16 Apr 2024
|
|
|
AI For Cyber Defense
sponsored by CyberMaxx
EBOOK:
For a deep dive on the relationship between AI and cyber defense, check out this 14-page e-book by SVP of Security Operations at CyberMaxx, Gary Monti.
Posted: 20 Sep 2024 | Published: 23 Sep 2024
|
|
|
Top 10 cloud stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK:
There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.
Posted: 24 Jan 2022 | Published: 24 Jan 2022
|
|
|
CIO Trends #9
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.
Posted: 08 Feb 2021 | Published: 01 Aug 2019
|
|
|
Drive Your Missions To Success With Custom Fly-Away Security Solutions To Defend Against The Unknown.
sponsored by Sealing Technologies
WHITE PAPER:
To perform their missions, government defense operations need secure, reliable systems and assets. In this white paper, discover how SealingTech can help.
Posted: 25 Sep 2024 | Published: 01 Oct 2024
|
|
|
CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.
Posted: 08 Feb 2021 | Published: 09 Apr 2020
|
|
|
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
Dell PowerStore Resiliency
sponsored by Dell Technologies
ESG TECHNICAL VALIDATION REPORT:
Many organizations are seeking defense and resiliency through disaster recovery and storage security. Dell Technologies recently announced PowerStore Prime, a comprehensive, integrated offering that combines new all-flash storage advancements with strategic business advantages. Read this Enterprise Strategy Group report to learn more.
Posted: 04 Nov 2024 | Published: 05 Nov 2024
|
|
|
THE RANSOMWARE ELIMINATION DIET
sponsored by Centripetal Networks
EBOOK:
ThreatOps isn’t the only ingredient in this Ransomware Elimination Diet. Read this e-book to discover the Ransomware Elimination Diet in its full, to learn how to transition from threat intelligence to ThreatOps, to understand how to stop the cyber kill chain, and more.
Posted: 02 Jul 2024 | Published: 02 Jul 2024
|
|
|
Taking a zero trust approach to IAM in Atlassian Cloud
sponsored by Atlassian
EBOOK:
Discover in this e-book how you can extend your company-wide IAM policies and build a proactive defense strategy to protect your users and data in Atlassian Cloud.
Posted: 11 Apr 2024 | Published: 11 Apr 2024
|
|
|
Computer Weekly - 5 November 2019: The benefits of API-first software development
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 Nov 2019
|
|
|
Zero Trust, Simplified Benefits of the CoIP® Platform Overlay
sponsored by Zentera Systems Inc.
WHITE PAPER:
Explore the simplified benefits of Zentera's CoIP Platform for implementing a robust Zero Trust architecture. Learn how this software-defined approach can reduce your attack surface, enable rapid compliance, and avoid costly infrastructure changes. Read the white paper to get started.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Computer Weekly – 7 May 2019: Nurturing innovation at DWP
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 May 2019
|
|
|
Taking A Zero Trust Approach To IAM In Atlassian Cloud
sponsored by Atlassian
WHITE PAPER:
Discover how to take a zero trust approach to identity and access management (IAM) in Atlassian cloud. Learn how to extend your IAM policies, build a proactive defense strategy, and secure remote access. Download the white paper to learn more.
Posted: 14 Aug 2024 | Published: 14 Aug 2024
|
|
|
ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT:
This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Enhance security with automation
sponsored by Red Hat
EGUIDE:
Explore how automation enhances security by unifying investigation, threat hunting, and incident response across an organization. Learn from customer success stories using Red Hat Ansible Automation Platform to boost productivity, efficiency, and security posture. Read the e-book to discover how automation strengthens your security approach.
Posted: 08 Oct 2024 | Published: 08 Oct 2024
|
|
|
The Public Sector’s Guide to Privilege
sponsored by CyberFOX
EBOOK:
Cybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.
Posted: 04 Oct 2024 | Published: 04 Oct 2024
|
|
|
Resilient Cybersecurity with Network Detection and Response
sponsored by Progress Software Corporation
WHITE PAPER:
Network Detection and Response (NDR) solutions have emerged to plug common gaps in cybersecurity protection. Discover NDR’s benefits, the NDR market landscape according to Gartner, and a review of the Progress Flowmon ADS solution in this white paper.
Posted: 16 May 2024 | Published: 16 May 2024
|
|
|
Computer Weekly – 19 July 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
|
AI in Cybersecurity: Friend or Foe?
sponsored by Deep Instinct
RESEARCH CONTENT:
Cybersecurity experts battle AI threats like deepfakes. Many use outdated EDR tools, but prevention strategies are emerging. This report explores predictive prevention for pre-emptive defense. Discover how to preempt evolving cyber risks in the full report.
Posted: 12 Jul 2024 | Published: 12 Jul 2024
|
|
|
CW ASEAN November 2016
sponsored by TechTarget Security
EZINE:
Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 08 Feb 2021 | Published: 31 Oct 2016
|
|
|
Protecting your organisation from itself
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
Posted: 08 Feb 2021 | Published: 06 Jan 2017
|
|
|
2024 Assessment Report
sponsored by Bitdefender
RESEARCH CONTENT:
Cybersecurity threats are evolving, with AI-powered attacks and cloud security challenges at the forefront. This report examines the state of cloud security, the impact of AI, and the need for proactive, multilayered defense strategies. Download the report to gain insights into navigating these new cybersecurity frontiers.
Posted: 04 Jul 2024 | Published: 04 Jul 2024
|
|
|
Unlocking the Power of Hybrid Cloud Solutions for the Federal Government with Dell Technologies and FCN
sponsored by FCN
WHITE PAPER:
Explore how federal governments can unlock hybrid cloud solutions with Dell Technologies and FCN. Learn about benefits like enhanced security, increased collaboration, scalability, and cost savings. Transition to cloud-based solutions with FCN's expertise.Read the white paper to see how your agency can embrace the cloud and transform operations.
Posted: 12 Nov 2024 | Published: 13 Nov 2024
|
|