Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
Improving Health by Addressing Social Needs: A Sustainable Path Forward
sponsored by ZeOmega
WHITE PAPER:
ZeOmega and the Center for Open Data Enterprise (CODE) have collaborated to create a powerful white paper addressing challenges related to Health-Related Social Needs (HRSN) interventions. Download it now to learn about opportunities to apply funding to address social needs.
Posted: 26 Sep 2024 | Published: 27 Sep 2024
|
|
|
Richmond Advisory Group Incident Readiness Response
sponsored by AT&T and LevelBlue
RESEARCH CONTENT:
To understand why mid-market organizations and SMEs purchase incident readiness and response services, The Richmond Advisory Group surveyed 500 cybersecurity decision-makers. Review the survey’s findings in this 2024 report, “Why Mid-market Organizations Are Prioritizing Incident Readiness and Response in the Face of Regulatory Scrutiny.”
Posted: 07 Jun 2024 | Published: 07 Jun 2024
|
|
|
5 Security Concerns for CISOs and How to Address Them
sponsored by Palo Alto Networks
WHITE PAPER:
This white paper explores 5 key security concerns for CISOs, including supply chain attacks, cloud security, and overloaded security teams. Get expert guidance on how to address these issues and prepare your organization for evolving cyberthreats. Read the full white paper to learn more.
Posted: 08 Nov 2024 | Published: 08 Nov 2024
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|
|
|
Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016
|
|
|
How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER:
Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023
|
|
|
African + Eastern Deploys Comprehensive Security Program with Secureworks
sponsored by SecureWorks
CASE STUDY:
Middle East beverage distributor African + Eastern deploys comprehensive security program with Secureworks, gaining 24/7 threat monitoring, detection, and response to reduce organizational risk. Read the full case study to learn how Secureworks' managed detection and response solution helped secure their digital environment.
Posted: 14 Nov 2024 | Published: 14 Nov 2024
|
|
|
NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017
|
|
|
Addressing the NIST Cybersecurity Framework 2.0 with the CyberArk Identity Security Platform
sponsored by CyberArk
WHITE PAPER:
Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.
Posted: 23 Aug 2024 | Published: 23 Aug 2024
|
|
|
How Modern DCIM Addresses CIO Management Challenges within Distributed, Hybrid IT Environments
sponsored by Schneider Electric
WHITE PAPER:
In this white paper, explore the evolution of enterprise IT portfolios and corresponding management challenges... and how DCIM software can help maintain the foundation for hybrid data center environments with distributed IT infrastructure.
Posted: 09 Mar 2023 | Published: 09 Mar 2023
|
|
|
How a Rideshare Giant Balances SMS Toll Fraud Security with Great User Experience
sponsored by Arkose Labs
CASE STUDY:
This case study explores how a major rideshare company combated SMS toll fraud while preserving a smooth customer experience. By partnering with Arkose Labs, the company saved $2.5M annually, blocked 99.5% of low-risk traffic without friction, and gained deeper visibility into user traffic. Read the full case study to learn more.
Posted: 16 Jul 2024 | Published: 16 Jul 2024
|
|
|
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020
|
|
|
UNIT 42 Managed Services Threat Report Summary
sponsored by Palo Alto Networks
RESEARCH CONTENT:
The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
Posted: 05 Oct 2024 | Published: 05 Oct 2024
|
|
|
The myth of email as proof of communication
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 08 Feb 2021 | Published: 02 Dec 2016
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
Luminis Health improves throughput & access at one of the nation’s busiest ERs
sponsored by Fabric Health
CASE STUDY:
Luminis Health faced rising wait times and staff burnout post-pandemic. To address these challenges, they partnered with Fabric to digitally transform their emergency department by digitizing the patient intake process, educating patients about their visit, and improving follow-up scheduling and PCP attachment.
Posted: 29 Aug 2024 | Published: 29 Aug 2024
|
|
|
IT OT Convergence
sponsored by TeamViewer
PRODUCT OVERVIEW:
With Industry 4.0 and a growing need to transform existing processes, industrial sectors are transcending towards connected ecosystems. But a convergence of IT and operational technology (OT) isn’t always as easy as it seems. Discover how TeamViewer Tensor addresses this with a unified, single window access to all IT and OT assets in this resource.
Posted: 14 Dec 2023 | Published: 14 Dec 2023
|
|
|
Network and Information Security Directive (NIS2)
sponsored by NCC Group
WHITE PAPER:
Prepare for the EU's new Network and Information Security Directive (NIS2) with this comprehensive guide. Learn about the key requirements, consequences of non-compliance, and how to ensure your organization is ready. Get the white paper now to understand the steps to achieve NIS2 compliance.
Posted: 03 Dec 2024 | Published: 03 Dec 2024
|
|
|
Print security: An imperative in the IoT era
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Analyst group Quocirca gives the perspective on the risks and best practices of print security.
Posted: 08 Feb 2021 | Published: 10 Jul 2017
|
|
|
Attack Surface Management
sponsored by Palo Alto Networks
EBOOK:
With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.
Posted: 07 Apr 2023 | Published: 08 Apr 2023
|
|
|
Software Escrow for the Australian Financial Sector
sponsored by NCC Group
ANALYST REPORT:
Software escrow is critical for ensuring business continuity and compliance in the financial sector. This guide from Escode, the global leader in software escrow, explores how escrow services can mitigate risks, enable independent software management, and support regulatory requirements like APRA CPS 230. Read the full guide to learn more.
Posted: 19 Dec 2024 | Published: 19 Dec 2024
|
|
|
Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing
sponsored by Fortra
WHITE PAPER:
Domain impersonation is a growing threat for organizations, with cybercriminals using look-alike domains and email spoofing to steal data and damage reputations. Learn how to effectively monitor, detect, and mitigate domain impersonation risks in this White Paper.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Mitigating Cyber Risks with MITRE ATT&CK
sponsored by Palo Alto Networks Unit42
EBOOK:
Although recovering from offline backups can provide some protection against encryption-only ransomware attacks, organizations must take additional measures to prepare for threat actors who extort victims. Browse a detailed view of the observations of Unit42 and discover expert recommendations for addressing them.
Posted: 12 Apr 2023 | Published: 12 Apr 2023
|
|