Tokens Reports

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

Royal Holloway: Secure multiparty computation and its application to digital asset custody
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
Posted: 20 Apr 2022 | Published: 20 Apr 2022

TechTarget ComputerWeekly.com

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

Cyber security in the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Identity trends for 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
Posted: 01 Mar 2023 | Published: 02 Mar 2023

TechTarget ComputerWeekly.com

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE: Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008

Information Security Magazine

Optimize deployment of generative AI models with NVIDIA NIM on AWS
sponsored by AWS & NVIDIA
PRODUCT OVERVIEW: Simplify deployment of generative AI models with NVIDIA NIM on AWS. Accelerate inference, optimize infrastructure, and maintain security and control of AI applications and data. Deploy production-grade NIM microservices with NVIDIA AI Enterprise on AWS. Learn more.
Posted: 03 Oct 2024 | Published: 26 Aug 2024

AWS & NVIDIA

CW Europe - December 2020-February 2021: Tour de France fans get a virtual experience
sponsored by TechTarget ComputerWeekly.com
EZINE: The organisers of this year's Tour de France worked with technology services company NTT in partnership with Amaury Sport Organisation to provide what they described as an "enhanced experience" for race fans who could not be at the roadside because of Covid restrictions.
Posted: 08 Feb 2021 | Published: 10 Dec 2020

TechTarget ComputerWeekly.com

Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

Elevate Identity Protection With A Secure Enterprise Browser
sponsored by CyberArk
WHITE PAPER: In today's cloud-first era, browsers are the most-used enterprise application with 83% of employees saying they can complete most or all their work within a browser. Unfortunately, consumer-focused browsers aren't built to prevent attackers who are relentlessly exploiting those security gaps to their advantage.
Posted: 04 Sep 2024 | Published: 04 Sep 2024

CyberArk

How A Major Airline Stays PCI Compliant - Even At 35,000 Feet
sponsored by VikingCloud
CASE STUDY: This case study showcases how a major airline partnered with VikingCloud to achieve PCI compliance, secure customer payment data, and transition from a reactive to proactive cybersecurity approach. Learn more by reading the full case study.
Posted: 21 Sep 2024 | Published: 23 Sep 2024

VikingCloud

10 examples of the metaverse for IT and business leaders
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Plenty of companies want to get in on the money-making potential of what has been dubbed the metaverse. Here are enterprise-focused and consumer-focused examples that business and IT leaders may want to explore.
Posted: 16 Oct 2022 | Published: 17 Oct 2022

TechTarget ComputerWeekly.com

Navigating Agentic AI Reasoning: ReAct vs ReWOO
sponsored by AWS & Source Allies
WHITE PAPER: Explore the differences between two popular agentic AI reasoning approaches - ReAct and ReWOO. Discover how these methodologies can optimize the autonomy and efficiency of your AI solutions. Read the white paper to learn more.
Posted: 21 Oct 2024 | Published: 21 Oct 2024

AWS & Source Allies

Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018

TechTarget ComputerWeekly.com

Generative AI Inferencing Use Cases with Cisco UCS X-Series M7 Blade Servers Using 5th Gen Intel Xeon Scalable Processors
sponsored by Cisco
PRODUCT OVERVIEW: Generative AI models require robust infrastructure to unleash their full potential. Cisco UCS with 5th Gen Intel Xeon Scalable processors delivers optimal performance, balanced architecture, and scalability to power demanding generative AI workloads like large language models. Download this white paper to learn more.
Posted: 01 Oct 2024 | Published: 01 Oct 2024

Cisco

9 Common Cryptocurrency Scams in 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Even though cryptocurrency is a newer trend, thieves are using old methods to steal. Here are some of the common cryptocurrency scams to watch out for.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TechTarget ComputerWeekly.com

The LLM Mesh: A Practical Guide to Using Generative AI in the Enterprise
sponsored by Dataiku
EBOOK: This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.
Posted: 30 Aug 2024 | Published: 30 Aug 2024

Dataiku

6 Ways to Automate With LogicMonitor
sponsored by LogicMonitor
WHITE PAPER: How can your MSP leverage IT automation solutions like LogicMonitor to both improve internal operations and service delivery to your customers? Find out by downloading this white paper, which covers six ways MSPs can automate with LogicMonitor.
Posted: 01 Mar 2023 | Published: 01 Mar 2023

TOPICS:  .NET
LogicMonitor

Multi-Factor Authentication Deployment Guide
sponsored by Okta
WHITE PAPER: Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET
Okta

2 types of endpoint encryption to protect data
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

Authentication Best Practices: On and Off the Cloud
sponsored by HID Global
EGUIDE: Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 08 Feb 2021 | Published: 12 Oct 2016

HID Global

IoT & the Enterprise: Exploring Opportunities and Challenges in Asia
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.
Posted: 08 Feb 2021 | Published: 26 Jun 2017

TechTarget ComputerWeekly.com

Managing Data Bias, Privacy, And Drift: The Importance Of Holistic Data Management
sponsored by OpenText
EBOOK: Discover how to effectively manage data bias, privacy, and drift in the age of data sprawl. Learn five strategic best practices to ensure comprehensive data oversight, foster trust, and drive data-driven outcomes. Read the full e-book to learn more.
Posted: 10 Oct 2024 | Published: 10 Oct 2024

OpenText

CW APAC - December 2020: Trend Watch on cloud infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE: The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.
Posted: 08 Feb 2021 | Published: 17 Dec 2020

TechTarget ComputerWeekly.com

Zero Trust Network Access
sponsored by Cloudflare
PRODUCT OVERVIEW: Zero trust philosophy is now at the core center of many organizations’ security strategies, and yet many struggle to find an offering that can effectively deliver on these principles. Cloudflare Zero Trust Network Access (ZTNA) is an all-in-one solution that has helped existing users realize many benefits. Read on to learn more.
Posted: 12 Dec 2023 | Published: 13 Dec 2023

TOPICS:  .NET
Cloudflare

IAM: Managing identity remains key to cyber security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 08 Feb 2021 | Published: 29 Aug 2019

TechTarget ComputerWeekly.com