Session Cookies Reports

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Feb 2020

TechTarget ComputerWeekly.com

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Breaking Down JSON Web Tokens
sponsored by FusionAuth
EBOOK: This eBook explores JSON Web Tokens (JWTs), detailing their structure, security, and best practices. Learn about JWT components, revocation strategies, and performance. Discover when and how to use JWTs in authentication systems. Read this eBook to deepen your understanding of this powerful token format.
Posted: 14 Mar 2025 | Published: 15 Mar 2025

FusionAuth

The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK: This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

FusionAuth

The State of Identity Security Opening Doors for the Right Entities and Locking Out the Bad Actors
sponsored by Portnox
ESG RESEARCH REPORT: In the past 12 months, 24% of organizations know that their workforce accounts or credentials have been compromised, and another 26% suspect that they've been compromised, according to research by Enterprise Strategy Group. To dig into more findings about the state of identity security, read this analyst report.
Posted: 18 Feb 2025 | Published: 19 Feb 2025

Portnox

The Backbone of Modern Security: Intelligent Privilege Controls TM for Every Identity
sponsored by CyberArk
WHITE PAPER: This whitepaper examines a new approach that aligns intelligent privilege controls with risk to keep your organization secure and your workers happy. Inside, learn how attack paths have changed, unique security challenges, the value of intelligent privilege controls, and more.
Posted: 23 Dec 2024 | Published: 23 Dec 2024

CyberArk

The Backbone of Modern Security: Intelligent Privilege Controls™ for Every Identity
sponsored by CyberArk
WHITE PAPER: With an exploding number of identities, changing environments and new attacks emerging daily, you need an identity security strategy that closes the gaps without disrupting the user experience. This whitepaper examines a new approach that aligns intelligent privilege controls with risk to keep your organization secure and your workers happy.
Posted: 01 Jan 2025 | Published: 01 Jan 2025

CyberArk

How to Stay Ahead of Ransomware: Combining ESE and EPM
sponsored by CyberArk
EBOOK: This e-book explores a preventative defense-in-depth approach to ransomware that combines endpoint identity security with an existing endpoint detection and response. Using intelligent privilege controls, CyberArk Endpoint Privilege Manager can help prevent credential theft, detect and stop lateral movement and tackle zero-day attacks.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

CyberArk

An Analysis of Attacker Activity through NDR, EDR, and NGFW Data
sponsored by Fortinet, Inc.
RESEARCH CONTENT: This white paper analyzes over 11 trillion network events to uncover the most common MITRE ATT&CK tactics and techniques used by attackers in 2023. It provides insights on C2, RAT malware, valid account abuse, and more to help security teams detect and respond to threats. Read the full white paper for comprehensive analysis.
Posted: 07 Oct 2024 | Published: 08 Oct 2024

Fortinet, Inc.

SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE: If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

A More Secure Alternative
sponsored by Google Workspace
WHITE PAPER: No organization is truly immune from state-sponsored cyber-attacks, and the severity of such threats on enterprise cloud and workspace environments cannot be understated. To understand how the security features of workspaces from cloud service providers like Microsoft and Google stack up in this climate, read the following paper.
Posted: 12 Mar 2025 | Published: 12 Mar 2025

Google Workspace

Why Modern IAM Is Crucial For Identity Security
sponsored by CyberArk
WHITE PAPER: As cyber threats evolve, so must your approach to securing access. Read this white paper now to discover how modern IAM, with intelligent privilege controls, empowers IT professionals to protect sensitive data and applications while enabling seamless, secure access.
Posted: 19 Dec 2024 | Published: 18 Dec 2024

CyberArk

State of Application Security 2024
sponsored by Cloudflare
EBOOK: Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.
Posted: 13 Sep 2024 | Published: 14 Sep 2024

TOPICS:  .NET
Cloudflare

State of Application Security 2024
sponsored by Cloudflare
EBOOK: This report reveals critical application security trends for 2024, including rising DDoS attacks, rapid zero-day exploits, and hidden API risks. It offers insights on mitigating threats across web apps, APIs, and client-side scripts. Read the full report to understand emerging risks and strengthen your application security strategy.
Posted: 11 Mar 2025 | Published: 11 Mar 2025

Cloudflare

Best Practices for Securing Cloud Identities
sponsored by CyberArk
WHITE PAPER: This white paper, leveraging the CyberArk Blueprint, presents a comprehensive framework for securing cloud identities using a holistic approach that includes both human and machine identities and advocates for a practical, risk-based strategy to enhance cloud security postures. Read on now to learn more.
Posted: 23 Aug 2024 | Published: 23 Aug 2024

CyberArk

The Complete Guide To Building An Identity Protection Strategy
sponsored by CrowdStrike
EBOOK: Identity-based attacks are rapidly increasing, accounting for the majority of security breaches. Take the first step toward a resilient identity security posture. Download the guide and learn how to protect your organization's digital identity landscape today.
Posted: 27 Mar 2025 | Published: 27 Mar 2025

CrowdStrike

DEVSECOPS BUYER’S GUIDE: APPLICATION SECURITY
sponsored by Contrast Security
EGUIDE: Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.
Posted: 15 Feb 2022 | Published: 16 Feb 2022

TOPICS:  .NET
Contrast Security

The Secure Coding Handbook
sponsored by Veracode
EBOOK: This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023

TOPICS:  .NET
Veracode

Arctic Wolf Security Operations 2024 Report
sponsored by Arctic Wolf
RESEARCH CONTENT: This report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Arctic Wolf

Top 3 Risks For DIY Auth In Regulated Industries
sponsored by FusionAuth
WHITE PAPER: This white paper examines the challenges of managing in-house authentication, particularly for regulated industries. It covers compliance, security, and the advantages of outsourcing. Discover how to select the right vendor and ensure a smooth transition. Read the full paper for insights on securing your organization's digital future.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

FusionAuth

McAfee Labs Threats Report
sponsored by McAfee
RESEARCH CONTENT: Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.
Posted: 05 May 2021 | Published: 05 May 2021

TOPICS:  Malware
McAfee

Computer Weekly – 28 January 2025: Turbulent times ahead for tech
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the World Economic Forum highlighted growing risks to digital supply chains – we examine the turbulence ahead. Data sovereignty is becoming a growing issue as companies move to the cloud – we look at the regulatory challenges. And we analyse the best practices in automated patch management. Read the issue now.
Posted: 27 Jan 2025 | Published: 28 Jan 2025

TechTarget ComputerWeekly.com

Effective Load Balancing Drives Business Agility And Growth
sponsored by Cloudflare
ANALYST REPORT: Modern applications strain legacy systems of delivery, forcing infrastructure teams to make cost, performance and security tradeoffs. A connectivity cloud offers composable, cloud-native load balancing, allowing organizations to deliver innovative applications without introducing complexity. Read this IDC Spotlight report to learn more.
Posted: 26 Apr 2024 | Published: 26 Apr 2024

TOPICS:  .NET
Cloudflare

2024 Comcast Business Cybersecurity Threat Report
sponsored by Comcast Business
RESEARCH CONTENT: Combining publicly available data with the 29 billion cybersecurity events Comcast Business detected across their base of security customers in 2023, this report provides a wide-angle view of the global threat landscape. Read now to learn more.
Posted: 19 Nov 2024 | Published: 19 Nov 2024

TOPICS:  .NET
Comcast Business

CyberRisk Validation Report – Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In the ever-evolving landscape of cloud network security solutions, Palo Alto Networks VM-Series Virtual Next-Generation Firewall emerges as a leader for security efficacy, operational efficiency, and robust SSL/TLS decryption and inspection. Read this report now to learn about top choices for advanced cloud network security.
Posted: 28 Feb 2025 | Published: 25 Feb 2025

TOPICS:  .NET
Palo Alto Networks

Data governance more important now than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
Posted: 08 Feb 2021 | Published: 11 Jun 2019

TechTarget ComputerWeekly.com

The Executive Guide to Generative AI
sponsored by Insight
RESEARCH CONTENT: This report provides a detailed analysis of the generative AI landscape, covering trends, use cases, and secure deployment best practices. Learn how top organizations use generative AI to boost productivity, enhance customer engagement, and foster innovation. Read the full report to unlock the strategic potential of this transformative technology.
Posted: 26 Nov 2024 | Published: 27 Nov 2024

Insight