Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022
|
|
|
Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Feb 2020
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
What’s Your Login Worth? Less Than a Latte Secure your workforce with a bold new approach.
sponsored by CyberArk
WHITE PAPER:
Fact: Attackers can buy stolen credentials on the dark web for less than a cup of coffee. In this insightful piece by Archit Lohokare, General Manager of Workforce Solutions at CyberArk, learn how a bold new approach to identity security can secure your workforce from the first touchpoint to the last mile of the digital journey.
Posted: 02 Dec 2024 | Published: 02 Dec 2024
|
|
|
Anatomy Of Identity Based Attacks
sponsored by Okta
WHITE PAPER:
74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
Posted: 12 Apr 2024 | Published: 13 Apr 2024
|
|
|
Establish cloud and on-prem privileged sessions, create tunnels, power zero-trust infrastructure access and secure remote database access without a VPN.
sponsored by Keeper Security Inc
PRODUCT OVERVIEW:
Secure remote access is critical for organizations today. Keeper Connection Manager provides an agentless, zero-trust solution with features like privileged access management, remote browser isolation, and secure database access. Learn more in the Product Overview.
Posted: 06 Sep 2024 | Published: 06 Sep 2024
|
|
|
How to Stay Ahead of Ransomware: Combining ESE and EPM
sponsored by CyberArk
EBOOK:
This e-book explores a preventative defense-in-depth approach to ransomware that combines endpoint identity security with an existing endpoint detection and response. Using intelligent privilege controls, CyberArk Endpoint Privilege Manager can help prevent credential theft, detect and stop lateral movement and tackle zero-day attacks.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
|
An Analysis of Attacker Activity through NDR, EDR, and NGFW Data
sponsored by Fortinet, Inc.
RESEARCH CONTENT:
This white paper analyzes over 11 trillion network events to uncover the most common MITRE ATT&CK tactics and techniques used by attackers in 2023. It provides insights on C2, RAT malware, valid account abuse, and more to help security teams detect and respond to threats. Read the full white paper for comprehensive analysis.
Posted: 07 Oct 2024 | Published: 08 Oct 2024
|
|
|
SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE:
If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021
|
|
|
Reimagine workforce access with an identity-first security strategy
sponsored by CyberArk
WHITE PAPER:
The rise in MFA bypass attacks and browser-based vulnerabilities indicate that just protecting the login is not enough to secure your workforce. This whitepaper explores a modern identity security strategy to securing workforce identities that’s centered on securing the complete digital user journey. Read on now to learn more.
Posted: 04 Dec 2024 | Published: 03 Dec 2024
|
|
|
Why Modern IAM Is Crucial For Identity Security
sponsored by CyberArk
WHITE PAPER:
As cyber threats evolve, so must your approach to securing access. Read this white paper now to discover how modern IAM, with intelligent privilege controls, empowers IT professionals to protect sensitive data and applications while enabling seamless, secure access.
Posted: 19 Dec 2024 | Published: 18 Dec 2024
|
|
|
Anatomy of an Attack
sponsored by JAMF
WHITE PAPER:
Explore the anatomy of a cyberattack through the seven phases of the cyber kill chain. Learn how to identify and defend against vulnerabilities that threat actors target. Download this white paper to strengthen your security posture and protect your organization.
Posted: 04 Sep 2024 | Published: 04 Sep 2024
|
|
|
2024 global threat report
sponsored by CrowdStrike
RESEARCH CONTENT:
The advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.
Posted: 08 Mar 2024 | Published: 09 Mar 2024
|
|
|
Secure remote IT support in 3 steps
sponsored by TeamViewer
WHITE PAPER:
As an IT security expert, you know that the challenges of protecting connected enterprises are evolving. To provide borderless access effectively, you need a powerful remote connectivity solution. But how do you get buy-in from leadership? Read this white paper to take the first step to toward secure remote IT support.
Posted: 02 May 2024 | Published: 02 May 2024
|
|
|
State of Application Security 2024
sponsored by Cloudflare
EBOOK:
Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.
Posted: 13 Sep 2024 | Published: 14 Sep 2024
|
|
|
Where Does Marketing Stop And Advertising Begin?
sponsored by SAS
WHITE PAPER:
As data deprecation nears, brands must double down on first-party data strategies, use customer understanding and enterprise decisioning, and embrace data-driven omnichannel customer journey activation. Learn how to navigate the new world of tech in this white paper.
Posted: 04 Nov 2024 | Published: 05 Nov 2024
|
|
|
Beyond the Login: Modern Identity Security for the Workforce How to minimize risk with end-to-end protection across the entire user journey.
sponsored by CyberArk
EBOOK:
The evolving threat landscape has rendered foundational endpoint and access controls prone to breaches. To secure the workforce against growing identity-based threats, organizations need a modern identity security strategy. Read this e-book now to learn about a modern approach to securing workforce identities.
Posted: 03 Dec 2024 | Published: 03 Dec 2024
|
|
|
The Complete Guide To Building an Identity Protection Strategy
sponsored by CrowdStrike
WHITE PAPER:
This white paper explores the threat of identity-based attacks and outlines a modern identity security strategy to protect your organization. Learn to gain unified visibility, detect anomalies in real-time, and implement risk-based conditional access to stop breaches. Read the full white paper to build an effective identity protection strategy.
Posted: 25 Nov 2024 | Published: 26 Nov 2024
|
|
|
Building an Identity Security Program
sponsored by Cisco
WHITE PAPER:
This e-book provides a blueprint for CISOs to build an effective identity security program. Learn about the four pillars of identity security, key business outcomes, and performance indicators to measure success. Download the e-book to secure your workforce identities and keep your organization safe.
Posted: 09 Nov 2024 | Published: 09 Nov 2024
|
|
|
Specsavers x TeamViewer
sponsored by TeamViewer
CASE STUDY:
Specsavers, the world's largest privately owned optical group, needs to defend its position and provide affordable, quality care to patients and customers. To do this, every aspect of the business must run smoothly, including its IT desk and support. Discover how TeamViewer Tensor makes it all possible in this case study.
Posted: 21 Mar 2024 | Published: 21 Mar 2024
|
|
|
The Secure Coding Handbook
sponsored by Veracode
EBOOK:
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023
|
|
|
Arctic Wolf Security Operations 2024 Report
sponsored by Arctic Wolf
RESEARCH CONTENT:
This report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.
Posted: 11 Oct 2024 | Published: 11 Oct 2024
|
|
|
Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette
sponsored by Cisco
RESEARCH CONTENT:
The 2024 "Cyber Threat Trends Report" by Cisco analyzes the threats crowding the cyber landscape, including information stealers, Trojans and ransomware. It also provides insights on how DNS security can help defend your organization against those growing threats. Read the 18-page report to unlock the full insights.
Posted: 07 Sep 2024 | Published: 12 Sep 2024
|
|
|
McAfee Labs Threats Report
sponsored by McAfee
RESEARCH CONTENT:
Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.
Posted: 05 May 2021 | Published: 05 May 2021
|
|
|
Zero Trust Network Access
sponsored by Cloudflare
PRODUCT OVERVIEW:
Zero trust philosophy is now at the core center of many organizations' security strategies, and yet many struggle to find an offering that can effectively deliver on these principles. Cloudflare Zero Trust Network Access (ZTNA) is an all-in-one solution that has helped existing users realize many benefits. Read on to learn more.
Posted: 27 Nov 2024 | Published: 13 Dec 2023
|
|
|
Effective Load Balancing Drives Business Agility And Growth
sponsored by Cloudflare
ANALYST REPORT:
Modern applications strain legacy systems of delivery, forcing infrastructure teams to make cost, performance and security tradeoffs. A connectivity cloud offers composable, cloud-native load balancing, allowing organizations to deliver innovative applications without introducing complexity. Read this IDC Spotlight report to learn more.
Posted: 26 Apr 2024 | Published: 26 Apr 2024
|
|
|
Implementing Data Privacy Excellence: The Paramount Way
sponsored by Ahlan Cyber
WHITE PAPER:
This white paper explores how businesses can balance data access and control to ensure data privacy compliance. It covers best practices for data encryption, governance, and security. Learn how to implement a robust data privacy framework and prepare for evolving regulations. Read the full white paper.
Posted: 19 Dec 2024 | Published: 19 Dec 2024
|
|
|
2024 Comcast Business Cybersecurity Threat Report
sponsored by Comcast Business
RESEARCH CONTENT:
Combining publicly available data with the 29 billion cybersecurity events Comcast Business detected across their base of security customers in 2023, this report provides a wide-angle view of the global threat landscape. Read now to learn more.
Posted: 19 Nov 2024 | Published: 19 Nov 2024
|
|