Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017
|
|
|
Next generation network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
Posted: 08 Feb 2021 | Published: 21 Mar 2018
|
|
|
Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018
|
|
|
Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019
|
|
|
Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021
|
|
|
Effective Load Balancing Drives Business Agility And Growth
sponsored by Cloudflare
ANALYST REPORT:
Modern applications strain legacy systems of delivery, forcing infrastructure teams to make cost, performance and security tradeoffs. A connectivity cloud offers composable, cloud-native load balancing, allowing organizations to deliver innovative applications without introducing complexity. Read this IDC Spotlight report to learn more.
Posted: 26 Apr 2024 | Published: 26 Apr 2024
|
|
|
How to prepare your network for IoT data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide outlines how business requirements will affect your IoT network build, takes a deep dive into specific IoT network architecture and explores IoT topology options.
Posted: 08 Feb 2021 | Published: 03 Oct 2019
|
|
|
Developing the Intelligent Core with Windows Server 2019
sponsored by Dell Technologies and Windows
EGUIDE:
65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. Learn more about digital platforms inside this resource.
Posted: 08 Feb 2021 | Published: 04 Jun 2020
|
|
|
Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Mar 2018
|
|
|
Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 08 Feb 2021 | Published: 21 Oct 2019
|
|
|
Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018
|
|
|
The Secure Coding Handbook
sponsored by Veracode
EBOOK:
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023
|
|
|
Analysis of the Linux Audit System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 08 Feb 2021 | Published: 01 Sep 2016
|
|
|
CW Middle East ezine January 2019
sponsored by TechTarget ComputerWeekly.com
EZINE:
Oil may be the main fuel to the economies of the Middle East, but the region is trying to break from its reliance on the black stuff. This ezine has already featured articles about the UAE and Saudi Arabia diversifying their economies, with particular interest in fintech.
Posted: 08 Feb 2021 | Published: 04 Jan 2019
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
Single-Vendor SASE
sponsored by Fortinet, Inc.
EBOOK:
This Dummies guide introduces you to Single-Vendor SASE—the delivery of networking and security capabilities from one vendor in a unified solution. Learn how consolidation can help IT network and security teams drive operational efficiency, reduce costs, and eliminate needless complexity.
Posted: 18 Dec 2024 | Published: 08 Oct 2024
|
|
|
A Computer Weekly buyer's guide to cloud bursting
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Cloud ideas expand. In this 12-page buyer's guide, Computer Weekly looks at the benefits and complexities of cloud bursting and the role of on-premise IT.
Posted: 08 Feb 2021 | Published: 25 Oct 2016
|
|
|
Guide to building an enterprise API strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022
|
|
|
AI Everywhere: Accelerate performance with latest Dell PowerEdge Servers
sponsored by Dell Technologies and Intel
WHITE PAPER:
The new Dell PowerEdge servers with 5th and 4th Gen Intel® Xeon® processors deliver advanced performance and energy-efficient design for data-intensive workloads like AI and at the edge. Discover how these servers can accelerate your transformation anywhere. Read the full white paper to learn more.
Posted: 20 Dec 2024 | Published: 20 Dec 2024
|
|
|
AI Everywhere: Accelerate performance with latest Dell PowerEdge Servers
sponsored by Dell Technologies and Intel
WHITE PAPER:
The new Dell PowerEdge servers with 5th and 4th Gen Intel® Xeon® processors deliver advanced performance and energy-efficient design for data-intensive workloads like AI and at the edge. Discover how these servers can accelerate your transformation anywhere. Read the full white paper to learn more.
Posted: 07 Jan 2025 | Published: 07 Jan 2025
|
|
|
Datacentre design and facilities: What you need to know
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we take a look at some of the latest thinking and trends around datacentre design, while shining a light on the differing approaches organisations take to ensure their server farms remain up and running, and can withstand all the compute demands expected of them.
Posted: 08 Feb 2021 | Published: 01 Mar 2019
|
|
|
CW Nordics February 2019
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.
Posted: 08 Feb 2021 | Published: 21 Feb 2019
|
|
|
Coip® Platform Zero Trust Mapping To The CISA Zero Trust Maturity Model
sponsored by Zentera Systems Inc.
WHITE PAPER:
This white paper maps Zentera's CoIP Platform to the CISA Zero Trust Maturity Model, demonstrating how the platform can help organizations rapidly transition to a Zero Trust security model. Learn more by reading the full white paper.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Computer Weekly – 1 August 2017: The fields of Athenry – how Apple's datacentre plans are causing turmoil in a small Irish town
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.
Posted: 08 Feb 2021 | Published: 01 Aug 2017
|
|