HTTP over SSL White Papers

(View All Report Types)
Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Zscaler Zero Trust Exchange
sponsored by Zscaler
RESEARCH CONTENT: CyberRatings.org evaluated Zscaler Zero Trust Exchange using their SSE Threat Protection Methodology v2.1. The product excelled in handling TLS/SSL cipher suites, blocking exploits and malware, and resisting evasion techniques. Performance metrics for HTTP/HTTPS capacity and file downloads were assessed. Read the report for detailed results.
Posted: 04 Mar 2025 | Published: 04 Mar 2025

Zscaler

Focus: IT Security in the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
Posted: 08 Feb 2021 | Published: 16 Sep 2016

TechTarget ComputerWeekly.com

Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017

TechTarget ComputerWeekly.com

Next generation network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
Posted: 08 Feb 2021 | Published: 21 Mar 2018

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cloud bursting
sponsored by TechTarget ComputerWeekly.com
EBOOK: Cloud ideas expand. In this 12-page buyer's guide, Computer Weekly looks at the benefits and complexities of cloud bursting and the role of on-premise IT.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Internet of Things Security
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
Posted: 08 Feb 2021 | Published: 07 Feb 2017

TechTarget ComputerWeekly.com

Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019

TechTarget ComputerWeekly.com

CyberRisk Validation Report – Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In the ever-evolving landscape of cloud network security solutions, Palo Alto Networks VM-Series Virtual Next-Generation Firewall emerges as a leader for security efficacy, operational efficiency, and robust SSL/TLS decryption and inspection. Read this report now to learn about top choices for advanced cloud network security.
Posted: 28 Feb 2025 | Published: 25 Feb 2025

TOPICS:  .NET
Palo Alto Networks

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

How Cloudflare helps address data protection and locality obligations in Europe
sponsored by Cloudflare
WHITE PAPER: Cloudflare's whitepaper details their commitment to data protection in Europe, covering privacy policies, security certifications, and the Data Localization Suite. Discover how Cloudflare aids customers in meeting GDPR requirements and keeping data within EU borders, emphasizing customer trust and data privacy through their global cloud network.
Posted: 11 Mar 2025 | Published: 11 Mar 2025

Cloudflare

5 Steps to Stop Ransomware with Zero Trust
sponsored by Zscaler
EBOOK: Download this five-step guide for a roadmap to building a robust ransomware defense strategy—and evaluate your current strategy using the handy checklists within. You'll learn how to reap the benefits of a zero trust architecture vs. legacy practices and strengthen your ransomware defense strategy. Read on now.
Posted: 25 Mar 2025 | Published: 05 Dec 2024

TOPICS:  .NET
Zscaler

5 Steps to Stop Ransomware with Zero Trust
sponsored by Zscaler
WHITE PAPER: Ransomware attacks are growing more sophisticated and lucrative. Protect your organization with a 5-step zero trust strategy to prevent initial compromise, eliminate lateral movement, and stop data loss. Read the white paper to learn more.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Strata Network Security Buyer’s Guide
sponsored by Palo Alto Networks
EBOOK: In this e-book, discover the essential buyer’s guide to network security solutions, and the secrets to creating security RFPs that get results.
Posted: 31 May 2024 | Published: 01 Jun 2024

TOPICS:  .NET
Palo Alto Networks

Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016

TechTarget ComputerWeekly.com

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 08 Feb 2021 | Published: 21 Oct 2019

TechTarget ComputerWeekly.com

6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.
Posted: 08 Feb 2021 | Published: 23 Jan 2017

TechTarget ComputerWeekly.com

Exabeam Support for the NYDFS Cybersecurity Regulation (23 NYCRR 500)
sponsored by Exabeam
PRODUCT OVERVIEW: The NYDFS Cybersecurity Regulation requires financial institutions to protect information systems and non-public data. This document explains how Exabeam's platform supports compliance through monitoring, threat detection, and reporting. Read the full Product Overview to see how Exabeam enhances your cybersecurity program.
Posted: 26 Mar 2025 | Published: 26 Mar 2025

Exabeam

Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Mar 2018

TechTarget ComputerWeekly.com

The future of API management: Key trends for IT leaders
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As enterprises accelerate digital transformation, API management has become increasingly complex. IT leaders must navigate an evolving landscape where efficiency, security, and modernisation intersect. This e-guide explores API management trends, including the challenges of API security, and the impact of genAI.
Posted: 20 Mar 2025 | Published: 20 Mar 2025

TechTarget ComputerWeekly.com

Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 08 Feb 2021 | Published: 02 Oct 2018

TechTarget ComputerWeekly.com