Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017
|
|
|
Next generation network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
Posted: 08 Feb 2021 | Published: 21 Mar 2018
|
|
|
Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018
|
|
|
Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019
|
|
|
Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021
|
|
|
Effective Load Balancing Drives Business Agility And Growth
sponsored by Cloudflare
ANALYST REPORT:
Modern applications strain legacy systems of delivery, forcing infrastructure teams to make cost, performance and security tradeoffs. A connectivity cloud offers composable, cloud-native load balancing, allowing organizations to deliver innovative applications without introducing complexity. Read this IDC Spotlight report to learn more.
Posted: 26 Apr 2024 | Published: 26 Apr 2024
|
|
|
How to prepare your network for IoT data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide outlines how business requirements will affect your IoT network build, takes a deep dive into specific IoT network architecture and explores IoT topology options.
Posted: 08 Feb 2021 | Published: 03 Oct 2019
|
|
|
Winning The Data-Centric Digital Business In This Decade
sponsored by Dell Technologies and Intel
WHITE PAPER:
The datacenter has evolved. Where businesses used to see the enterprise datacenter as a location (or locations), the modern datacenter has no physical construct. Rather, the modern datacenter emphasizes data – and spans the core to the cloud and the edge. Access this white paper now to learn more.
Posted: 09 Sep 2024 | Published: 09 Sep 2024
|
|
|
Developing the Intelligent Core with Windows Server 2019
sponsored by Dell Technologies and Windows
EGUIDE:
65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. Learn more about digital platforms inside this resource.
Posted: 08 Feb 2021 | Published: 04 Jun 2020
|
|
|
Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Mar 2018
|
|
|
Data Lakes with Supermicro® Storage Servers
sponsored by Supermicro
WHITE PAPER:
Data lakes are evolving to support a wider range of data and applications. Learn how Supermicro storage servers can enable high-performance, hybrid data lakes that meet diverse needs. Read the full white paper to discover the latest data lake architectures and Supermicro solutions.
Posted: 08 Nov 2024 | Published: 08 Nov 2024
|
|
|
Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 08 Feb 2021 | Published: 21 Oct 2019
|
|
|
Empowering Enterprises with AI: Entering the Era of Choice
sponsored by Dell Technologies & AMD
WHITE PAPER:
This white paper explores how Dell and AMD are democratizing AI by making it more accessible to enterprises. It highlights how their solutions can enable real-time AI workflows, ensure data security, and scale cost-effectively. Read the full paper now to learn how you can leverage AI to transform your business.
Posted: 13 Nov 2024 | Published: 13 Nov 2024
|
|
|
The Dynamic Duo: Versatility Meets Performance
sponsored by Dell Technologies & AMD
INFOGRAPHIC:
The new 17G Dell PowerEdge servers, powered by the latest 5th Gen AMD EPYC™ processors, deliver exceptional performance with up to 192 cores per CPU, making them ideal for a wide range of applications from mainstream workloads to advanced AI tasks. Access this infographic to learn more.
Posted: 13 Nov 2024 | Published: 13 Nov 2024
|
|
|
Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018
|
|
|
The Secure Coding Handbook
sponsored by Veracode
EBOOK:
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023
|
|
|
Analysis of the Linux Audit System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 08 Feb 2021 | Published: 01 Sep 2016
|
|
|
Supermicro H14 Servers: Upgrade Your Data Center To Deliver Maximum Performance
sponsored by Supermicro
WHITE PAPER:
As AI transforms enterprise computing, organizations are modernizing their data centers to keep up. This white paper breaks down how to level up your data center and improve performance with help from Supermicro H14 servers. Read on to access 13 pages of insights.
Posted: 08 Nov 2024 | Published: 12 Nov 2024
|
|
|
CW Middle East ezine January 2019
sponsored by TechTarget ComputerWeekly.com
EZINE:
Oil may be the main fuel to the economies of the Middle East, but the region is trying to break from its reliance on the black stuff. This ezine has already featured articles about the UAE and Saudi Arabia diversifying their economies, with particular interest in fintech.
Posted: 08 Feb 2021 | Published: 04 Jan 2019
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
A Computer Weekly buyer's guide to cloud bursting
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Cloud ideas expand. In this 12-page buyer's guide, Computer Weekly looks at the benefits and complexities of cloud bursting and the role of on-premise IT.
Posted: 08 Feb 2021 | Published: 25 Oct 2016
|
|
|
Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT:
The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 02 Oct 2024 | Published: 03 Oct 2024
|
|
|
Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT:
The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 23 Nov 2024 | Published: 03 Oct 2024
|
|
|
Guide to building an enterprise API strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022
|
|