Defense Industry Reports

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

The Defender’s Advantage
sponsored by Google
EBOOK: By reading this e-book, you will understand how to activate your cyber defense with an intelligence-led approach. Read on now to learn how you can leverage threat intelligence, detection engineering, and coordinated incident response to maximize your Defender's Advantage and strengthen your cybersecurity posture.
Posted: 17 Jan 2025 | Published: 21 Jan 2025

Google

Achieve CMMC compliance with Google Workspace
sponsored by Google Workspace
EBOOK: Google Workspace with Assured Controls Plus aids Defense Industrial Base organizations in meeting CMMC requirements for email, collaboration, and data management. It provides robust security, encryption, and compliance at a lower cost than traditional solutions. Discover how Workspace supports your CMMC journey in this detailed eBook.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

Google Workspace

Trust Emerges as Cybersecurity Issue for 42% of Security Decision-Makers
sponsored by XtelligentMedia Healthcare
EGUIDE: With cyberattacks on the rise, trust in teams and technology is crucial. However, 42% of security leaders see a trust deficit as their biggest hurdle, a new survey showed. Some trust is also misplaced, with 66% of security leaders trusting employees to prevent cyberattacks more than their own teams. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023

XtelligentMedia Healthcare

VXWorks for Aerospace and Defense
sponsored by Wind River
PRODUCT OVERVIEW: VxWorks® aerospace and defense software saves costs and accelerates certification. Proven in 750+ safety programs and 120+ aircraft, Read how VxWorks streamlines compliance, satisfies real-time operating systems needs, secures systems, simplifies software integration, and inspires developers.
Posted: 02 Dec 2023 | Published: 02 Dec 2023

TOPICS:  .NET
Wind River

Contrast Security Application Detection and Response (ADR) Praised by Industry Analysts
sponsored by Contrast Security
BLOG: Contrast Security's Application Detection and Response (ADR) solution has been praised by industry analysts for addressing gaps in cybersecurity defenses. ADR provides visibility and context to prevent sophisticated attacks on applications and APIs. Read the full press release to learn more.
Posted: 10 Dec 2024 | Published: 11 Dec 2024

Contrast Security

ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT: This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

The Industrial CISO: Bringing Balance
sponsored by Netskope
EBOOK: This report explores the evolving role of CISOs in the industrial sector, revealing their growing confidence as business enablers despite perception challenges from C-suite peers. It examines the adoption of zero trust principles and the need for CISOs to focus on business enablement over technology. Read the full eBook for deeper insights.
Posted: 27 Feb 2025 | Published: 28 Feb 2025

Netskope

Cloud Infrastructure Wireless Airspace Defense
sponsored by Bastille
PRODUCT OVERVIEW: Wireless threats can impact cloud infrastructure security, allowing data exfiltration and system disruption. This solution brief outlines how Bastille's comprehensive wireless monitoring and threat detection can defend your cloud infrastructure. Read the full brief to learn more.
Posted: 19 Feb 2025 | Published: 20 Feb 2025

Bastille

Empower your workforce to be your first line of cyber defense
sponsored by StarHub
WHITE PAPER: Empower your workforce to be your first line of defense against cyber threats. Learn how StarHub's Cybersecurity Awareness Training Platform can help your organization combat phishing attacks and data breaches. Read the white paper to discover the key features and benefits.
Posted: 20 Feb 2025 | Published: 20 Feb 2025

StarHub

Industry Insights Generative AI & Cybersecurity
sponsored by NOKIA Intel
ANALYST REPORT: This Omdia research report examines how telecom organizations are incorporating generative AI into their cybersecurity strategies to improve threat detection, automate tasks, and enhance resilience. Explore the benefits, challenges, and future plans for leveraging this transformative technology by reading the full report.
Posted: 23 Nov 2024 | Published: 02 Oct 2024

NOKIA Intel

Deep Learning Delivers Proactive Cyber Defense
sponsored by Deep Instinct
ANALYST REPORT: Amidst the cybersecurity skills shortage, organizations are hard pressed to find new answers to evolving problems. Deep learning, a subset of machine learning, offers a highly accurate way to identify attack patterns and stop threats before they become attacks, without the need for highly skilled cybersecurity experts. Read on to learn more.
Posted: 22 Feb 2023 | Published: 22 Feb 2023

TOPICS:  .NET
Deep Instinct

Zscaler ThreatLabz 2024 Phishing Report
sponsored by Zscaler
RESEARCH CONTENT: Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

Defending A Defense Contractor With A Compliant Unified Communications Solution
sponsored by ARG, Inc.
CASE STUDY: A national, privately held defense contractor had previously leveraged Avaya on-prem PBX, Verizon PRIs and numerous collaboration and messaging tools (Teams, Slack, etc.) As many of these were disjointed, compliance risks arose. View this case study to learn how ARG helped this contractor aggregate tools and eliminate overlap.
Posted: 30 Jul 2021 | Published: 30 Jul 2021

TOPICS:  .NET
All resources sponsored by ARG, Inc.

Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense
sponsored by ESET
WHITE PAPER: This white paper explores the role of cyber threat intelligence in proactive defense strategies. It examines challenges, benefits of prevention-first approaches, and how ESET's Threat Intelligence solutions enhance security. Learn to leverage CTI for effective threat mitigation and risk reduction. Read the full white paper for insights.
Posted: 27 Feb 2025 | Published: 27 Feb 2025

ESET

Top 3 Risks For DIY Auth In Regulated Industries
sponsored by FusionAuth
WHITE PAPER: This white paper examines the challenges of managing in-house authentication, particularly for regulated industries. It covers compliance, security, and the advantages of outsourcing. Discover how to select the right vendor and ensure a smooth transition. Read the full paper for insights on securing your organization's digital future.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

FusionAuth

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

TechTarget ComputerWeekly.com

AI Driven SOC Transformation with Cortex XSIAM
sponsored by Palo Alto Networks
WHITE PAPER: As cyberattacks occur more quickly and more often, how can security operations centers (SOCs) keep up? Tap into this 21-page white paper to discover how 6 organizations transformed their SOC to boost their defenses in the evolving threat landscape.
Posted: 15 May 2024 | Published: 15 May 2024

TOPICS:  .NET
Palo Alto Networks

A CISO’s Guide to the AI Opportunity in Security Operations
sponsored by Exabeam
WHITE PAPER: AI is transforming cybersecurity, presenting opportunities and threats for CISOs. This guide defines AI technologies impacting security, explores their role in threat detection, and outlines building AI-augmented defenses. Discover proven technologies that strengthen security. Read the white paper to prepare your SOC for an AI-driven future.
Posted: 26 Mar 2025 | Published: 26 Mar 2025

Exabeam

Dell Trusted Workspace
sponsored by Dell Technologies and Intel
PRODUCT OVERVIEW: Effective endpoint security today requires multiple layers of defense that protect the device, network, and cloud for your users. Preview a PC hardware and software suite from Dell Trusted Workspace in this product overview which offers these capabilities and multiple layers of defense.
Posted: 26 Feb 2025 | Published: 21 Feb 2025

Dell Technologies and Intel

Dell Trusted Workspace
sponsored by Dell Technologies and Intel
PRODUCT OVERVIEW: Effective endpoint security today requires multiple layers of defense that protect the device, network, and cloud for your users. Preview a PC hardware and software suite from Dell Trusted Workspace in this product overview which offers these capabilities and multiple layers of defense.
Posted: 13 Mar 2025 | Published: 13 Mar 2025

Dell Technologies and Intel

Dell Trusted Workspace
sponsored by Dell Technologies and Intel
PRODUCT OVERVIEW: Effective endpoint security today requires multiple layers of defense that protect the device, network, and cloud for your users. Preview a PC hardware and software suite from Dell Trusted Workspace in this product overview which offers these capabilities and multiple layers of defense.
Posted: 21 Feb 2025 | Published: 21 Feb 2025

Dell Technologies and Intel

CW ASEAN: Defend against disruption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

Focus: Infosec17
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 08 Feb 2021 | Published: 19 Jun 2017

TechTarget ComputerWeekly.com

Securing Virtualized Environments: The Imperative of Preemptive Protection
sponsored by Centripetal Networks
WHITE PAPER: Virtualized environments face unique security challenges due to vulnerabilities in VDI and virtual server technologies. This white paper explores how intelligence-powered cybersecurity can deliver preemptive protection against exploits, reducing the risk of damaging breaches during the patching window. Read the full white paper to learn more.
Posted: 11 Jun 2024 | Published: 11 Jun 2024

Centripetal Networks

Threat Intelligence Report 2024
sponsored by NOKIA Intel
ANALYST REPORT: The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 23 Nov 2024 | Published: 03 Oct 2024

NOKIA Intel