Classifying Domain Generation Algorithm (DGA) Domains With Machine Learning
sponsored by Sealing Technologies
WHITE PAPER:
Domain generation algorithms (DGAs) can help threat actors evade detection by constantly moving between random domain names. So, how can your organization defend against that technique? Dig into this white paper to discover how SealingTech built a neural network model that detects malicious domains with 97% accuracy.
Posted: 25 Sep 2024 | Published: 30 Sep 2024
|
|
|
Top 10 cyber crime stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019
|
|
|
Annual Report On The State Of Application Security
sponsored by Veracode
ANALYST REPORT:
In the current spectrum of cybersecurity, organizations are continuously trying to reduce their security debt, but what is just as important is to not introduce security flaws that can accumulate over the life of your applications, making them more vulnerable in the long run. Read on to learn more about the current state of application security.
Posted: 09 Jun 2023 | Published: 09 Jun 2023
|
|
|
Kanverse “Zero Touch” - AP Invoice Automation (APIA): Product Datasheet
sponsored by Kanverse.ai
PRODUCT OVERVIEW:
Kanverse "Zero Touch" AP Invoice Automation streamlines document processing with AI-powered classification, data extraction, and validation. Access this white paper to learn how you can reduce errors, increase efficiency, and secure your AP workflows.
Posted: 24 Oct 2024 | Published: 25 Oct 2024
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
Infosec culture: A former helicopter pilot's perspective
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 08 Feb 2021 | Published: 26 Mar 2018
|
|
|
Top 10 cyber security stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
Posted: 08 Feb 2021 | Published: 23 Dec 2019
|
|
|
The Future Of Retail Customer Service: Interactive And Unified
sponsored by Talkdesk
RESEARCH CONTENT:
As economic pressures force consumers to be more money conscious, organizations recognize the stakes. In this Talkdesk Research Report, 303 global responses were collected among CX professionals employed by Retail and eCommerce organizations with more than 200 full-time employees. Read on to learn more.
Posted: 15 Jun 2024 | Published: 15 Jun 2024
|
|
|
Computer Weekly – 4 June 2019: GDPR one year on – is it working?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jun 2019
|
|
|
How Modern DCIM Helps Multi-Tenant Colocation Data Centers Be More Competitive
sponsored by Schneider Electric
WHITE PAPER:
In this white paper, explore practical examples of how modern commercial DCIM software makes colocation data center operations more competitive by improving resiliency, security, environmental sustainability, transparency, and operational efficiency.
Posted: 21 Mar 2024 | Published: 21 Mar 2024
|
|
|
How Modern DCIM Helps Multi-Tenant Colocation Data Centers Be More Competitive
sponsored by Schneider Electric
WHITE PAPER:
In this white paper, discover practical examples of how modern commercial DCIM software can make colocation data center operations more competitive by improving resiliency, security, sustainability, transparency, and more.
Posted: 24 Feb 2024 | Published: 24 Feb 2024
|
|
|
World Economic Forum Global Risks Report 2018
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
Posted: 08 Feb 2021 | Published: 17 Jan 2018
|
|
|
Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 08 Feb 2021 | Published: 21 Mar 2019
|
|
|
Generative AI in the Enterprise with AMD Accelerators
sponsored by Dell Technologies & AMD
WHITE PAPER:
How can you ensure your organization is leveraging GenAI to the best of its abilities. This design guide describes the architecture and design of the Dell Validated Design for Generative AI with AMD accelerators. Read now to learn more. Dell PowerEdge server with AMD Instinct™ Accelerators.
Posted: 13 Nov 2024 | Published: 13 Nov 2024
|
|
|
Kubernetes Patterns Reusable Elements For Designing Cloud Native Applications
sponsored by Red Hat
EBOOK:
This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.
Posted: 16 Apr 2024 | Published: 16 Apr 2024
|
|