Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER:
This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007
|
|
|
Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER:
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009
|
|
|
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK:
The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024
|
|
|
Enabling Performance and Security: Why IT Departments No Longer Have to Choose with Modern Hybrid Infrastructures
sponsored by Connections
BLOG:
As cyberattacks rise, businesses must strengthen their defenses. Fortunately, modern hybrid infrastructure with Zero Trust principles can boost performance and security without compromising user experience. Read this blog post now to learn how to protect your data and devices at scale.
Posted: 03 Jan 2025 | Published: 03 Jan 2025
|
|
|
From checkboxes to checkmates: How Google Workspace can help you achieve CMMC 2.0 compliance
sponsored by Google
BLOG:
Google Workspace offers robust security features to help organizations meet CMMC 2.0 compliance. With encryption, access controls, and advanced security measures, it provides a comprehensive solution for protecting sensitive data. Discover how Google Workspace enhances cybersecurity and streamlines compliance. Read the blog post for insights.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
From checkboxes to checkmates: How Google Workspace can help you achieve CMMC 2.0 compliance
sponsored by Google Workspace
BLOG:
Google Workspace offers security features to help meet CMMC 2.0 compliance. Benefits include encryption, access controls, data loss prevention, and advanced measures. Google's approach aligns with CMMC 2.0, providing a scalable, cost-effective solution. Read this blog to learn how Google Workspace can enhance your cybersecurity posture.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Webinar - CMMC Compliance: Critical Cybersecurity Strategies To Close Compliance Gaps
sponsored by Corsica Technologies
WEBCAST:
The Cybersecurity Maturity Model Certification (CMMC) is a program designed to enforce the protection of sensitive unclassified information shared by the DoD. Tune into this webinar to gain a CMMC 101 overview so your organization is adequately prepared to comply moving forward.
Posted: 14 Feb 2025 | Premiered: Feb 14, 2025
|
|
|
MRO: Facilities Management Solutions
sponsored by Zebra Technologies
PRODUCT OVERVIEW:
Zebra's facility management solutions empower defense operations with enhanced security, optimized staff communication, improved efficiency, and streamlined asset management. Learn how Zebra can help your military facilities achieve a performance edge by reading the full application brief.
Posted: 27 Sep 2024 | Published: 27 Sep 2024
|
|
|
Top 10 cloud stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK:
There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.
Posted: 24 Jan 2022 | Published: 24 Jan 2022
|
|
|
CIO Trends #9
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.
Posted: 08 Feb 2021 | Published: 01 Aug 2019
|
|
|
Keys to Successfully Adopting an Integrated Risk Strategy
sponsored by Oversight Systems
WHITE PAPER:
This white paper explores adopting an integrated risk strategy by connecting the three lines of defense for effective risk management. It covers AI-powered platforms, continuous monitoring, and aligning finance, compliance, and audit teams. Discover how to enhance risk mitigation and optimize spend management by reading this white paper.
Posted: 07 Mar 2025 | Published: 08 Mar 2025
|
|
|
Achieve CMMC compliance with Google Workspace
sponsored by Google Workspace
EBOOK:
Google Workspace with Assured Controls Plus aids Defense Industrial Base organizations in meeting CMMC requirements for email, collaboration, and data management. It provides robust security, encryption, and compliance at a lower cost than traditional solutions. Discover how Workspace supports your CMMC journey in this detailed eBook.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
How MSPs can Implement Compliance Mandated Access Management Controls
sponsored by CyberQP
WHITE PAPER:
Explore how MSPs can secure admin accounts and customer identities to meet NIST and CMMC compliance requirements. Learn about privileged access management, password updates, and other best practices to protect your environment. Read the full white paper for more insights.
Posted: 03 Jan 2025 | Published: 04 Jan 2025
|
|
|
CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.
Posted: 08 Feb 2021 | Published: 09 Apr 2020
|
|
|
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
THE RANSOMWARE ELIMINATION DIET
sponsored by Centripetal Networks
EBOOK:
ThreatOps isn’t the only ingredient in this Ransomware Elimination Diet. Read this e-book to discover the Ransomware Elimination Diet in its full, to learn how to transition from threat intelligence to ThreatOps, to understand how to stop the cyber kill chain, and more.
Posted: 02 Jul 2024 | Published: 02 Jul 2024
|
|
|
Computer Weekly - 5 November 2019: The benefits of API-first software development
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 Nov 2019
|
|
|
Zero Trust, Simplified Benefits of the CoIP® Platform Overlay
sponsored by Zentera Systems Inc.
WHITE PAPER:
Explore the simplified benefits of Zentera's CoIP Platform for implementing a robust Zero Trust architecture. Learn how this software-defined approach can reduce your attack surface, enable rapid compliance, and avoid costly infrastructure changes. Read the white paper to get started.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Computer Weekly – 7 May 2019: Nurturing innovation at DWP
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 May 2019
|
|
|
Materiel Logistics with Barcoding
sponsored by Zebra Technologies
PRODUCT OVERVIEW:
Zebra's barcoding solutions can modernize U.S. Military materiel logistics, enhancing security, inventory visibility, compliance, and efficiency. Learn how Zebra's scanners, wearables, printers, and more can elevate your logistics operations by reading the full product overview.
Posted: 27 Sep 2024 | Published: 27 Sep 2024
|
|
|
Taking A Zero Trust Approach To IAM In Atlassian Cloud
sponsored by Atlassian
WHITE PAPER:
Discover how to take a zero trust approach to identity and access management (IAM) in Atlassian cloud. Learn how to extend your IAM policies, build a proactive defense strategy, and secure remote access. Download the white paper to learn more.
Posted: 14 Aug 2024 | Published: 22 Jan 2025
|
|
|
ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT:
This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Computer Weekly – 19 July 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
|
The Public Sector’s Guide to Privilege
sponsored by CyberFOX
EBOOK:
Cybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.
Posted: 04 Oct 2024 | Published: 04 Oct 2024
|
|
|
AI in Cybersecurity: Friend or Foe?
sponsored by Deep Instinct
RESEARCH CONTENT:
Cybersecurity experts battle AI threats like deepfakes. Many use outdated EDR tools, but prevention strategies are emerging. This report explores predictive prevention for pre-emptive defense. Discover how to preempt evolving cyber risks in the full report.
Posted: 12 Jul 2024 | Published: 12 Jul 2024
|
|
|
Internet Security Report Q2 2024
sponsored by WatchGuard Technologies, Inc.
ANALYST REPORT:
This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.
Posted: 18 Dec 2024 | Published: 11 Dec 2024
|
|
|
Internet Security Report Q2 2024
sponsored by WatchGuard Technologies, Inc.
ANALYST REPORT:
This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.
Posted: 11 Dec 2024 | Published: 11 Dec 2024
|
|