Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Focus: IT Security in the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
Posted: 08 Feb 2021 | Published: 16 Sep 2016
|
|
|
Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017
|
|
|
Next generation network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
Posted: 08 Feb 2021 | Published: 21 Mar 2018
|
|
|
A Computer Weekly buyer's guide to cloud bursting
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Cloud ideas expand. In this 12-page buyer's guide, Computer Weekly looks at the benefits and complexities of cloud bursting and the role of on-premise IT.
Posted: 08 Feb 2021 | Published: 25 Oct 2016
|
|
|
Progress MOVEit Features What Do You Get with Progress MOVEit?
sponsored by Progress Software Corporation MOVEit
PRODUCT OVERVIEW:
Your core business processes likely rely on accurate, industry-specific data, data which must be stored securely and compliantly. Progress Software has a fleet of managed file transfer solutions designed to assist any enterprise in transferring their sensitive files. Download this resource to learn more.
Posted: 13 Nov 2024 | Published: 13 Nov 2024
|
All resources sponsored by Progress Software Corporation MOVEit
|
|
Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018
|
|
|
Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021
|
|
|
A Computer Weekly Buyer's Guide to Internet of Things Security
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
Posted: 08 Feb 2021 | Published: 07 Feb 2017
|
|
|
Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019
|
|
|
Zscaler ThreatLabz State of Encrypted Attacks Report
sponsored by Zscaler
RESEARCH CONTENT:
Encrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
MOVEit Transfer API API Interface for MOVEit Transfer and MOVEit Cloud
sponsored by Progress Software Corporation MOVEit
PRODUCT OVERVIEW:
MOVEit Transfer API lets you simplify administrative tasks by integrating with your favorite business applications, providing extended functionality to Progress® MOVEit® Transfer and Progress® MOVEit® Cloud. In this resource, learn more about how you can move faster and maintain centralized control of your file transfers with MOVEit Transfer API.
Posted: 20 Nov 2024 | Published: 20 Nov 2024
|
All resources sponsored by Progress Software Corporation MOVEit
|
|
Moveit® Automation Simplify Data Workflows With Powerful Managed File Transfer Orchestration
sponsored by Progress Software Corporation MOVEit
PRODUCT OVERVIEW:
Transferring thousands of mission-critical files across your managed servers requires careful consideration for security and compliance measures. But doing so could take weeks and cost an organization a fortune in resources. Read this white paper to learn
Posted: 08 Nov 2024 | Published: 09 Nov 2024
|
All resources sponsored by Progress Software Corporation MOVEit
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 08 Feb 2021 | Published: 21 Dec 2020
|
|
|
5 Steps to Stop Ransomware with Zero Trust
sponsored by Zscaler
WHITE PAPER:
Ransomware attacks are growing more sophisticated and lucrative. Protect your organization with a 5-step zero trust strategy to prevent initial compromise, eliminate lateral movement, and stop data loss. Read the white paper to learn more.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
5 Steps to Stop Ransomware with Zero Trust
sponsored by Zscaler
EBOOK:
Download this five-step guide for a roadmap to building a robust ransomware defense strategy—and evaluate your current strategy using the handy checklists within. You’ll learn how to reap the benefits of a zero trust architecture vs. legacy practices and strengthen your ransomware defense strategy. Read on now.
Posted: 05 Dec 2024 | Published: 05 Dec 2024
|
|
|
Safeguarding Your Data in a Work-From-Anywhere World
sponsored by Zscaler
EBOOK:
Secure your data in a work-from-anywhere world with Zscaler's integrated data protection approach. Learn how to gain visibility, control, and compliance across cloud apps, endpoints, and public clouds. Read the white paper to discover Zscaler's comprehensive data security solution.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Firewall Buyers Guide
sponsored by Palo Alto Networks
BUYER'S GUIDE:
As network perimeters have evolved, firewalls have too. So, what constitutes a modern firewall? This buyer’s guide maps out 15 non-negotiable capabilities. Keep reading to access those insights and more.
Posted: 04 Apr 2024 | Published: 04 Apr 2024
|
|
|
The Threat Prevention Buyer’s Guide
sponsored by Zscaler
BUYER'S GUIDE:
This Threat Prevention Buyer's Guide explores the evolving security landscape, emphasizing the need for cloud-native sandboxing that can detect and prevent unknown threats inline without disrupting user productivity. Learn how to choose the right cloud sandbox solution. Read the full buyer's guide.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Strata Network Security Buyer’s Guide
sponsored by Palo Alto Networks
EBOOK:
In this e-book, discover the essential buyer’s guide to network security solutions, and the secrets to creating security RFPs that get results.
Posted: 31 May 2024 | Published: 01 Jun 2024
|
|
|
How to Defend Against Look-Alike Domain Threats
sponsored by Fortra
WHITE PAPER:
This playbook breaks down the domain lifecycle, how look-alike domains are used to enable cyberthreats, and best practices for collecting, curating, and mitigating domain threats. Read the full guide to learn how to defend your organization against look-alike domain attacks.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
SecureIQlab Report
sponsored by Palo Alto Networks
ANALYST REPORT:
This comprehensive report compares the security efficacy, operational efficiency, and resiliency of 12 leading advanced cloud firewall solutions. Key metrics include threat protection, false positive detection, and SSL/TLS support. Read the full report to assess the best solution for your cloud security needs.
Posted: 05 Nov 2024 | Published: 06 Nov 2024
|
|
|
Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016
|
|
|
Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018
|
|