Association for Automatic Identification and Mobility Reports

ACCELERATING IMPACT: NONPROFITS + SERVICENOW
sponsored by ServiceNow
EBOOK: How can you balance the nuanced IT requirements within your nonprofit while delivering exceptional experiences for customers and employees? Access this e-book to examine the key areas in which ServiceNow supports the organizational and digital transformation goals of nonprofits.
Posted: 07 Jan 2025 | Published: 07 Jan 2025

ServiceNow

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by TechTarget Search Windows Server
EZINE: In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

TechTarget Search Windows Server

Firewall Buyers Guide
sponsored by Palo Alto Networks
BUYER'S GUIDE: As network perimeters have evolved, firewalls have too. So, what constitutes a modern firewall? This buyer’s guide maps out 15 non-negotiable capabilities. Keep reading to access those insights and more.
Posted: 04 Apr 2024 | Published: 04 Apr 2024

TOPICS:  .NET
Palo Alto Networks

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by Exabeam
WHITE PAPER: The MITRE ATT&CK framework offers a standardized knowledge base of adversary tactics and techniques, aiding organizations in crafting threat-informed defenses. This SANS white paper details how to use the ATT&CK framework for cyber threat intelligence, gap identification, and analytics testing, with practical strategies.
Posted: 04 Apr 2025 | Published: 05 Apr 2025

Exabeam

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by Exabeam
WHITE PAPER: The MITRE ATT&CK framework offers a standardized knowledge base of adversary tactics and techniques, aiding organizations in crafting threat-informed defenses. This SANS white paper details how to use the ATT&CK framework for cyber threat intelligence, gap identification, and analytics testing, with practical strategies.
Posted: 09 Apr 2025 | Published: 05 Apr 2025

Exabeam

Manufacturing Background Check Strategies for Faster Hiring
sponsored by Checkr
WHITE PAPER: Streamline your manufacturing hiring process with AI-powered background checks. Learn how to create a seamless candidate experience, automate compliance workflows, and integrate with your HR tech stack. Read the full checklist to modernize your background screening.
Posted: 06 Feb 2025 | Published: 06 Feb 2025

Checkr

Outlining 11 typical types of medical mistakes and patient harms
sponsored by XtelligentMedia Healthcare
EGUIDE: Understanding the most common types of medical errors might help tailor patient safety best practices.
Posted: 24 Oct 2024 | Published: 25 Oct 2024

XtelligentMedia Healthcare

The 5 Stages of CTEM
sponsored by XM Cyber
WHITE PAPER: Increasingly, The Continuous Threat Exposure Management (CTEM) Framework by Gartner is being seen as an impactful way to address the full range of challenges that put organizations at risk. Read this white paper now to discover the 5 stages of CTEM and find out how you can change the way your business handles cyber risk.
Posted: 09 Jan 2025 | Published: 11 Jan 2025

XM Cyber

Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER: Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TOPICS:  Access Control
ERROR TEST

Strata Network Security Buyer’s Guide
sponsored by Palo Alto Networks
EBOOK: In this e-book, discover the essential buyer’s guide to network security solutions, and the secrets to creating security RFPs that get results.
Posted: 31 May 2024 | Published: 01 Jun 2024

TOPICS:  .NET
Palo Alto Networks

Truman Medical Centers/ University Health Charts Big Improvements In Clinician Communication And Satisfaction With Single Mobility Investment
sponsored by Zebra Technologies
CASE STUDY: Giving nurses, doctors and other staff one key clinical mobile device has improved care team satisfaction by 35% – and that’s just one of the many benefits realized so far. Explore the benefits of a single mobility investment in this case study.
Posted: 10 May 2024 | Published: 10 May 2024

TOPICS:  .NET
Zebra Technologies

Buyer’s Guide to Automated Layer 2 Discovery & Mapping Tools
sponsored by Progress Software Corporation WhatsUp Gold
BUYER'S GUIDE: Layer 2 discovery provides detailed network views, saving time on documentation and ensuring compliance. A complete solution includes automatic discovery, inventories, mapping, and compliance tools to quickly identify issues and maintain accurate diagrams. Learn how it optimizes network management in this buyer's guide.
Posted: 26 Apr 2023 | Published: 18 Apr 2025

All resources sponsored by Progress Software Corporation WhatsUp Gold

Enabling APRA CPS 234 Compliance with Saviynt Identity Cloud
sponsored by Saviynt
WHITE PAPER: Minimizing the likelihood and impact of data breaches and data loss due to criminal attacks is a key objective of the Australian Prudential Regulation Authority's (APRA) Australian Prudential Standard CPS 234. Download this paper to access the full information on complying with APRA CPS 234.
Posted: 04 Apr 2025 | Published: 05 Apr 2025

Saviynt

Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016

TechTarget ComputerWeekly.com

Build Solar Better Balance of System Solutions from PV Module to Transmission Line
sponsored by Panduit
PRODUCT OVERVIEW: Explore Panduit's balance of system solutions for solar plants, from module to transmission. Featuring UV-resistant cable management, grounding, identification, and protection components for efficiency and reliability in harsh environments. Read this white paper to learn how BOS components can reduce downtime and maximize your solar project's ROI.
Posted: 17 Mar 2025 | Published: 18 Mar 2025

Panduit

Zero-click two-factor authentication
sponsored by Sinch
EBOOK: Explore how zero-click two-factor authentication can enhance security and user experience for financial services. Learn about innovative solutions like Data Verification and Flash Call Verification that streamline authentication without compromising protection. Read the full guide to discover how these methods can transform your processes.
Posted: 30 Aug 2024 | Published: 03 Sep 2024

Sinch

Journey to modernizing IT services and operations
sponsored by ServiceNow
WHITE PAPER: How can you boost workforce productivity AND deliver better IT services? Say YES to both with modern, resilient AI-powered IT service operations.
Posted: 27 Mar 2025 | Published: 27 Mar 2025

ServiceNow

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Next-Gen Cybersecurity: How to Automate Suspicious & Malicious File Analysis in SentinelOne
sponsored by CODEHUNTER
WHITE PAPER: As the volume and complexity of malware grows, security teams struggle with alert fatigue and false positives. Automate the malware analysis process with SentinelOne and CodeHunter to enhance threat detection, improve response time, and streamline security operations. Read the e-book to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

CODEHUNTER

Why Passkeys Improve User Security & How To Implement Them
sponsored by FusionAuth
WHITE PAPER: Passkeys offer a secure alternative to traditional passwords, reducing vulnerability to phishing and social engineering attacks. This white paper explores how passkeys work, their benefits over passwords, and best practices for implementation. Learn how passkeys can enhance security and user experience. Stay ahead in authentication technology.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

FusionAuth

Building a Future-Ready Workforce
sponsored by Censia, Inc
WHITE PAPER: AI-enabled skills management offers scalable workforce planning amid rapid skill evolution. Discover how AI can future-proof your talent management strategy.
Posted: 18 Mar 2025 | Published: 19 Mar 2025

All resources sponsored by Censia, Inc

XDR Maximizing Operation Efficiency
sponsored by Bitdefender
EBOOK: Streamlining security operations with automation and XDR can enhance efficiency, reduce risks, and empower security teams. In this e-book, you'll learn how to simplify incident response, leverage XDR, and implement best practices to strengthen your cybersecurity posture. Read on now to learn more.
Posted: 25 Feb 2025 | Published: 06 Mar 2025

Bitdefender

Data discovery: how to pick the right software
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.
Posted: 08 Feb 2021 | Published: 20 Nov 2019

TechTarget ComputerWeekly.com

Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017

TechTarget ComputerWeekly.com

3 Strategies To Enhance Your Cyber Asset Attack Surface Management Strategy
sponsored by Axonius
PRODUCT OVERVIEW: Secure your attack surface with comprehensive asset intelligence. Axonius helps you minimize exposure by unifying asset data, remediating vulnerabilities, and accelerating incident response. Learn how to enhance your cyber asset attack surface management strategy by reading the full solution brief.
Posted: 17 Dec 2024 | Published: 17 Dec 2024

Axonius

A Holistic Approach to Strengthening Cyber Resilience
sponsored by Verizon
WHITE PAPER: As network perimeters dissolve and access points multiply, cybersecurity must adapt to distributed work. This white paper explores holistic strategies for strengthening cyber resilience in today's complex threat landscape. Read the full white paper to discover actionable approaches for securing your organization's digital assets.
Posted: 28 Mar 2025 | Published: 28 Mar 2025

Verizon