Network Perimeter Security Reports

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

Computer Weekly – 16 October 2018: Drilling into AI at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Oct 2018

TechTarget ComputerWeekly.com

Top APAC security predictions for 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
Posted: 08 Feb 2021 | Published: 16 Jan 2020

TechTarget ComputerWeekly.com

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

5 cybersecurity myths and how to address them
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Software-defined networking: Spotlight on ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the state of adoption of Software-defined networking (SDN) in the ASEAN, how the technology can be used to secure critical systems and what you can do to get started.
Posted: 08 Feb 2021 | Published: 26 Apr 2018

TechTarget ComputerWeekly.com

Making Sense of Zero-Trust Security
sponsored by Informa TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 26 Mar 2021 | Published: 01 May 2021

Informa TechTarget

IT/OT convergence is necessary, but not so simple
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
Posted: 08 Feb 2021 | Published: 14 Aug 2020

TechTarget ComputerWeekly.com

Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

VIPRE Takes A Bite Out Of Bloatware
sponsored by Sunbelt Software
WHITE PAPER: Sunbelt Software's new VIPRE Enterprise package is ideally suited to combating legacy and new blended malware threats from traditional viruses to the newest spam and Trojans.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Sunbelt Software