Defense Industry Reports

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Trust Emerges as Cybersecurity Issue for 42% of Security Decision-Makers
sponsored by XtelligentMedia Healthcare
EGUIDE: With cyberattacks on the rise, trust in teams and technology is crucial. However, 42% of security leaders see a trust deficit as their biggest hurdle, a new survey showed. Some trust is also misplaced, with 66% of security leaders trusting employees to prevent cyberattacks more than their own teams. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023

XtelligentMedia Healthcare

Edge and Industrial IoT at Scale
sponsored by SUSE
EBOOK: In this 57-page Gorilla Guide you'll learn best practices for securing, scaling, and managing edge solutions with open source platforms like Kubernetes. Download now to learn how to build resilient, mission-critical edge applications.
Posted: 02 May 2024 | Published: 02 May 2024

TOPICS:  .NET
SUSE

ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT: This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

Cyber Security in Healthcare: Frontline Defenses for Critical Data
sponsored by Fortra
EBOOK: This e-book explores critical cyber security challenges facing healthcare organizations, including phishing, insider threats, data breaches, and ransomware. Learn how to strengthen your security posture with tailored training solutions that empower your team. Read the e-book to build a resilient cyber security culture.
Posted: 19 Dec 2024 | Published: 19 Dec 2024

Fortra

Industry Insights Generative AI & Cybersecurity
sponsored by NOKIA
ANALYST REPORT: This Omdia research report examines how telecom organizations are incorporating generative AI into their cybersecurity strategies to improve threat detection, automate tasks, and enhance resilience. Explore the benefits, challenges, and future plans for leveraging this transformative technology by reading the full report.
Posted: 23 Nov 2024 | Published: 02 Oct 2024

NOKIA

Industry Insights Generative AI & Cybersecurity
sponsored by NOKIA
ANALYST REPORT: This Omdia research report examines how telecom organizations are incorporating generative AI into their cybersecurity strategies to improve threat detection, automate tasks, and enhance resilience. Explore the benefits, challenges, and future plans for leveraging this transformative technology by reading the full report.
Posted: 01 Oct 2024 | Published: 02 Oct 2024

NOKIA

2024 State of Industrial Networking Report for Utilities
sponsored by Cisco
ANALYST REPORT: This report reveals how utility firms are enhancing performance, security, and innovation through operational technology. Key findings include the importance of IT/OT collaboration, increased cybersecurity investment, and AI's potential in industrial networking. Read the full Analyst Report to future-proof your utility's OT infrastructure.
Posted: 12 Dec 2024 | Published: 12 Dec 2024

Cisco

Fastly Threat Insights Report
sponsored by Fastly
RESEARCH CONTENT: This 2024 Threat Insights Report offers a comprehensive analysis of the latest attack trends and techniques, designed to help security software managers enhance their defenses.
Posted: 27 Sep 2024 | Published: 28 Sep 2024

TOPICS:  .NET
Fastly

Deep Learning Delivers Proactive Cyber Defense
sponsored by Deep Instinct
ANALYST REPORT: Amidst the cybersecurity skills shortage, organizations are hard pressed to find new answers to evolving problems. Deep learning, a subset of machine learning, offers a highly accurate way to identify attack patterns and stop threats before they become attacks, without the need for highly skilled cybersecurity experts. Read on to learn more.
Posted: 22 Feb 2023 | Published: 22 Feb 2023

TOPICS:  .NET
Deep Instinct

Zscaler ThreatLabz 2024 Phishing Report
sponsored by Zscaler
RESEARCH CONTENT: Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

Defending A Defense Contractor With A Compliant Unified Communications Solution
sponsored by ARG, Inc.
CASE STUDY: A national, privately held defense contractor had previously leveraged Avaya on-prem PBX, Verizon PRIs and numerous collaboration and messaging tools (Teams, Slack, etc.) As many of these were disjointed, compliance risks arose. View this case study to learn how ARG helped this contractor aggregate tools and eliminate overlap.
Posted: 30 Jul 2021 | Published: 30 Jul 2021

TOPICS:  .NET
All resources sponsored by ARG, Inc.

Ransomware Essentials: A Guide for Financial Services Firm Defense
sponsored by Akamai Technologies
WHITE PAPER: Ransomware attacks are increasingly targeting financial institutions, causing disruptions to operations and major financial losses. The 2024 update of FS-ISAC Ransomware Essentials provides critical insights into ransomware defense strategies, incident response plans, and crisis management. Learn how to safeguard your institution.
Posted: 20 Dec 2024 | Published: 20 Dec 2024

TOPICS:  .NET
Akamai Technologies

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

TechTarget ComputerWeekly.com

How Offensive Security Strengthens Security Posture and Reduces Defensive Costs
sponsored by CyberMaxx
ESG SHOWCASE: In the face of abounding security risks, many organizations are turning to managed detection and response (MDR) providers for help. To understand how MDR can support both offensive and defensive security, download this report by TechTarget’s Enterprise Strategy Group (ESG).
Posted: 23 Feb 2024 | Published: 23 Feb 2024

TOPICS:  .NET
CyberMaxx

Security 360: Annual Trends Report 2024
sponsored by JAMF
RESEARCH CONTENT: Jamf's annual security report analyzes the evolving threat landscape, evaluating device, application, malware, and web-based risks. It provides best practices to improve security posture, including managing vulnerabilities, implementing defense-in-depth, and aligning with compliance standards. Read the full report to secure your modern workplace.
Posted: 04 Sep 2024 | Published: 04 Sep 2024

JAMF

Thousands of Organizations Trust Their Cyber Defense to Secureworks, a Leader in MDR
sponsored by SecureWorks
PRODUCT OVERVIEW: Secureworks Taegis platform offers a comprehensive MDR solution with advanced XDR capabilities, delivering over 400% ROI on average. Designed to reduce risk and fill talent gaps, it provides 24/7 expert security support. Learn more about the Secureworks Taegis platform in this product overview.
Posted: 14 Nov 2024 | Published: 14 Nov 2024

SecureWorks

AI Driven SOC Transformation with Cortex XSIAM
sponsored by Palo Alto Networks
WHITE PAPER: As cyberattacks occur more quickly and more often, how can security operations centers (SOCs) keep up? Tap into this 21-page white paper to discover how 6 organizations transformed their SOC to boost their defenses in the evolving threat landscape.
Posted: 15 May 2024 | Published: 15 May 2024

TOPICS:  .NET
Palo Alto Networks

Balancing Security and Agility
sponsored by FinThrive
WHITE PAPER: Explore effective strategies for healthcare cyber resilience that balance security and agility. Learn how to develop incident response plans, implement continuous monitoring, and partner with the right RCM vendor to enhance data protection and operational continuity. Read the full white paper.
Posted: 13 Oct 2024 | Published: 14 Oct 2024

FinThrive

CyberSense® for PowerProtect Cyber Recovery
sponsored by Index Engines
PRODUCT OVERVIEW: CyberSense, an AI-powered solution integrated with Dell PowerProtect Cyber Recovery, detects data corruption from cyberattacks with 99.99% accuracy. It analyzes backups to identify suspicious changes and provides forensic reports to facilitate rapid recovery, minimizing business disruption. Learn more about CyberSense.
Posted: 03 Oct 2024 | Published: 03 Oct 2024

Index Engines

CW ASEAN: Defend against disruption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

A Holistic Approach to Software Vulnerability Protection
sponsored by Spinnaker Support
PRODUCT OVERVIEW: Spinnaker Shield provides a robust defense for Oracle, SAP, and JD Edwards applications. Offering expert guidance, customized security assessments, and proactive vulnerability management, it bolsters your security stance. Discover how Spinnaker secures critical systems in our full overview.
Posted: 16 May 2024 | Published: 16 May 2024

TOPICS:  .NET
Spinnaker Support

Securing Virtualized Environments: The Imperative of Preemptive Protection
sponsored by Centripetal Networks
WHITE PAPER: Virtualized environments face unique security challenges due to vulnerabilities in VDI and virtual server technologies. This white paper explores how intelligence-powered cybersecurity can deliver preemptive protection against exploits, reducing the risk of damaging breaches during the patching window. Read the full white paper to learn more.
Posted: 11 Jun 2024 | Published: 11 Jun 2024

Centripetal Networks

InterVision Mastering Managed Cloud Protection
sponsored by Intervision
INFOGRAPHIC: Regardless of industry, keeping data in the cloud comes with risks. Hackers want your customer information, financials, and anything else they get their hands on. To combat this, you need a solid cloud security posture. For a truly comprehensive cloud protection program, you need the right capabilities. Read on to learn what they are.
Posted: 19 Jun 2024 | Published: 19 Jun 2024

TOPICS:  .NET
Intervision

Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT: The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 23 Nov 2024 | Published: 03 Oct 2024

NOKIA

Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT: The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 02 Oct 2024 | Published: 03 Oct 2024

NOKIA