Enterprise Computing Reports

When AI Goes Rogue: Strengthening the Bars of the Cage
sponsored by Trend Micro
EBOOK: As AI becomes more agentic, risks of rogue systems rise. This e-book explores three rogue AI types: malicious, subverted, and accidental. It details identification methods, real-world cases, and offers mitigation strategies like configuration, authorization, protection, and monitoring. Read to enhance your AI security safeguards.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

Trend Micro

AI-Powered Data Defense: How Zscaler Prevents Data Loss and Reduces Risk
sponsored by Zscaler
PRODUCT OVERVIEW: Explore how Zscaler's AI-powered data protection platform prevents data loss across all channels—web, SaaS, cloud, email, and BYOD—through unified policies and consistent alerting. Learn how it secures sensitive information from generative AI risks and streamlines security operations. Read the e-book to discover modern data defense strategies.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

Zscaler

VxRail and PowerStore: a Better Together solution that elevates business
sponsored by Dell Technologies
WEBCAST: Dell Technologies experts in partnership with Intel present on how VxRail and PowerStore combined in one solution can help your company overcome common HCI limitations by ensuring independent storage scalability, enterprise efficiency and cost optimization. Tune in now to discover how to break down silos that hold your business back.
Posted: 16 Apr 2025 | Premiered: Apr 16, 2025

Dell Technologies

VxRail and PowerFlex: a dynamic duo for demanding workloads
sponsored by Dell Technologies
WEBCAST: Let experts walk you through a range of use cases for how, with PowerFlex as the primary storage, VxRail dynamic nodes can address extreme workload requirements and deliver consolidation efficiencies.
Posted: 16 Apr 2025 | Premiered: Apr 16, 2025

Dell Technologies

The Observability Journey at Capital One
sponsored by AWS & Observe
CASE STUDY: Capital One became the first US financial institution to fully migrate to AWS cloud in 2020. They use Amazon CloudWatch for logs, AWS Config, and CloudTrail for security and observability. This transformation enables faster development, better governance, and advanced data management for AI and ML. Watch the full webinar to learn more.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

AWS & Observe

The Digital Noise Impact Report
sponsored by Unily Group Limited
RESEARCH CONTENT: Gallup’s 2024 “State of the Global Workplace” report found that an eye watering 41% of employees report experiencing “a lot of stress at work.” In this research report, Unily set out to interrogate this finding, learn how digital tools impact our workplace stress levels, and explore potential solutions. Read on now to unlock key findings.
Posted: 04 Apr 2025 | Published: 08 Apr 2025

Unily Group Limited

NIS2: Why Everyone’s Compliant Until They’re Not
sponsored by Checkpoint Software Technologies
WHITE PAPER: The EU's NIS2 Directive poses a compliance challenge as guidance rather than strict regulation, creating a scenario where organizations are "compliant until they're not." Though less demanding than DORA, NIS2 still mandates security measures tailored to each organization. Read this white paper to learn how to navigate NIS2 compliance.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

Checkpoint Software Technologies

Transforming Security Management With Genai-Powered Assistants
sponsored by Checkpoint Software Technologies
WHITE PAPER: GenAI-powered assistants transform security management by automating tasks and providing real-time insights. These virtual team members streamline operations, save time, cut costs, and enhance security through natural language interaction and contextual guidance. Read this white paper to explore key GenAI use cases in today's threat landscape.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

Checkpoint Software Technologies

Beyond Security: Analyzing The Wider Implications Of DORA
sponsored by Checkpoint Software Technologies
WHITE PAPER: With DORA implementation in full force, financial organizations face challenges beyond cybersecurity, including supply chain oversight, incident reporting, and liability for board members. The regulation demands cultural shifts and procedural changes. Read the white paper to explore seven critical DORA-related challenges facing CISOs today.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

Checkpoint Software Technologies

Chatgpt Security Risks: A Guide For Cyber Security Professionals
sponsored by Checkpoint Software Technologies
WHITE PAPER: As ChatGPT adoption grows, businesses face four key security risks: unintentional sharing of sensitive data, privacy concerns, malware creation, and data breaches. Organizations need robust security measures to mitigate these risks while benefiting from AI. Read this white paper to understand how ChatGPT risks could affect your business.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

Checkpoint Software Technologies

5 Point Guide Reducing Risk And Building Resilience With Cyber Security
sponsored by Checkpoint Software Technologies
WHITE PAPER: Security isn't just defensive—it can drive growth. This paper offers leaders a strategic approach to reducing cyber risk and building resilience. Read this white paper to shift your strategy from reactive to proactive and learn how to align security with business goals, consolidate vendors, engage stakeholders, and create a roadmap for success.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

Checkpoint Software Technologies

The State Of Cyber Security 2025
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT: The State of Cyber Security 2025 report highlights a 58% rise in infostealer attacks, increased ransomware targeting of healthcare, and evolving nation-state cyber tactics. Cloud vulnerabilities and edge devices remain key threats. Read this report to grasp today's threat landscape and apply recommended defense strategies.
Posted: 16 Apr 2025 | Published: 16 Apr 2025

Checkpoint Software Technologies

Reflecting on the Q1 Threat Landscape: Attacks & Lessons Learned
sponsored by CultureAI
BLOG: Q1 2025 exposed major cyber threats: the DeepSeek security lapse, OmniGPT's 34-million-user data breach, malvertising on MacOS, and deceptive CAPTCHA phishing. These highlight the need for proactive human risk management beyond traditional training. Read the blog to learn how to detect and mitigate human cyber risks in real-time.
Posted: 15 Apr 2025 | Published: 16 Apr 2025

CultureAI

Top 5 Cyber Threats CultureAI Detected in Q1 2025
sponsored by CultureAI
BLOG: CultureAI's data shows that in Q1 2025, 50% of employees created critical or high-level security risks monthly. Key threats were weak passwords, exposed credentials, password reuse, lack of MFA, and guessable passwords. Traditional security training is insufficient. Read on now to learn how automated solutions can reduce human cyber risk.
Posted: 15 Apr 2025 | Published: 16 Apr 2025

CultureAI

Navigating the Oracle EBS Landscape: Insights and Strategies for Modern Enterprises
sponsored by Rimini Street
RESEARCH CONTENT: A survey shows 95% of Oracle E-Business Suite users find their release meets needs, with 58% on unsupported versions. Only 16% consider Oracle Cloud Fusion, while 51% look at third-party support to cut costs and fund AI (68%) and cloud (65%) innovation. Explore how organizations extend EBS value while investing in strategic initiatives.
Posted: 15 Apr 2025 | Published: 16 Apr 2025

Rimini Street

2025 The State of Digital Adoption
sponsored by WalkMe
RESEARCH CONTENT: The "State of Digital Adoption 2025" report shows enterprises lose $104M annually to digital inefficiencies and underestimate app usage by 1,600%. Using three or more digital adoption best practices yields 85% ROI. As AI adoption grows, a critical employee-executive readiness gap remains. Read this report for a blueprint to HyperProductivity.
Posted: 14 Apr 2025 | Published: 15 Apr 2025

WalkMe

The State of Cybersecurity Incident Response
sponsored by Palo Alto Networks
WEBCAST: Join a fireside chat with Forrester analyst Jess Burn and Unit 42 VP Sam Rubin on cybersecurity incident response. Gain insights into IR challenges, business continuity integration, and emerging technologies. Learn about Palo Alto Networks' threat-informed approach to preventing breaches. Watch the webinar to enhance your IR skills.
Posted: 14 Apr 2025 | Premiered: Apr 14, 2025

Palo Alto Networks

Breaking Through the Ransomware Fog
sponsored by Palo Alto Networks
WEBCAST: Join Unit 42 experts in exploring a real-world ransomware attack on a large manufacturer. This webinar reveals how threat actors adapt tactics to increase speed, damage, and pressure. Discover the attack anatomy, investigation process, and defense strategies against evolving threats. Register for actionable insights.
Posted: 14 Apr 2025 | Premiered: Apr 14, 2025

Palo Alto Networks

Getting Under the Surface of Your Cyber Risk
sponsored by Trend Micro
INFOGRAPHIC: As cyber threats advance, Cyber Risk Exposure Management (CREM) offers real-time risk assessment to identify vulnerabilities, prioritize remediation, and ensure compliance. In this infographic, learn how CREM can protect your business.
Posted: 12 Apr 2025 | Published: 12 Apr 2025

Trend Micro

Trend Micro Offers Multi- Layered Security to Power NHS Cloud Pioneer SLAM
sponsored by Trend Micro
CASE STUDY: South London and Maudsley NHS Trust improved security with Trend Micro, safeguarding their hybrid cloud for 5,000 employees across multiple sites. This unified approach protected them during the WannaCry attack and facilitated cloud adoption with cost savings. Discover how this NHS leader achieved robust security with minimal management.
Posted: 12 Apr 2025 | Published: 12 Apr 2025

Trend Micro

The CISO Credibility Gap: September 2024 Trend Micro A global study How Boardroom Comms Challenges Are Hurting NHS Cyber-Resilience
sponsored by Trend Micro
RESEARCH CONTENT: NHS IT leaders, despite high confidence in cyber-resilience, struggle to communicate cybersecurity risks to boards. A study shows 74% face pressure to downplay threats, affecting budget and planning. Discover how Attack Surface Risk Management platforms and better communication can boost healthcare cyber-resilience in this report.
Posted: 12 Apr 2025 | Published: 12 Apr 2025

Trend Micro

Great Western Hospitals NHS Foundation Trust Optimizes Cyberhealth with Trend Micro Vulnerability Shielding
sponsored by Trend Micro
CASE STUDY: Great Western Hospitals NHS Trust improved cybersecurity using Trend Micro solutions to protect critical systems. By deploying Deep Security for servers and Apex One for endpoints, they achieved proactive defense against vulnerabilities, including zero-day threats, with minimal disruption. Discover how shielding enhanced their security control.
Posted: 12 Apr 2025 | Published: 12 Apr 2025

Trend Micro

Tackling The Challenge of NHS Cybersecurity
sponsored by Trend Micro
WHITE PAPER: NHS cybersecurity faces challenges like tight budgets, skill gaps, and complex supply chains. This white paper shows how Trend Vision One secures NHS digital estates by enhancing efficiency, managing supply chain risk, and protecting legacy systems. It offers visibility, AI threat detection, and automated remediation. Discover a holistic approach.
Posted: 12 Apr 2025 | Published: 12 Apr 2025

Trend Micro

Boardroom Breakdown: How NHS CISOs can leap the Credibility gap
sponsored by Trend Micro
RESEARCH CONTENT: NHS CISOs face challenges with cybersecurity amid digital transformation, budget constraints, and a complex attack surface. Research shows 74% of healthcare CISOs feel pressured to downplay cyber risks, while boards see security as an IT issue. Read this report to learn how communication can bridge the gap and improve NHS cyber-resilience.
Posted: 12 Apr 2025 | Published: 12 Apr 2025

Trend Micro

The CISO Credibility Gap: September 2024 Trend Micro A global study Why Higher Eduation Boards and IT Leaders Need to Align on Cyber-Resilience
sponsored by Trend Micro
RESEARCH CONTENT: A study of 144 higher education IT leaders shows a "credibility gap" between cybersecurity professionals and boards. While 95% are confident in cyber-resilience, 72% feel pressured to downplay risks. Read the report to see how closing this gap improves cyber resilience and board relationships.
Posted: 12 Apr 2025 | Published: 12 Apr 2025

Trend Micro