Cyber security in the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 08 Feb 2021 | Published: 11 Apr 2017
|
|
|
Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021
|
|
|
Royal Holloway: Secure multiparty computation and its application to digital asset custody
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
Posted: 20 Apr 2022 | Published: 20 Apr 2022
|
|
|
Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023
|
|
|
SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020
|
|
|
Identity trends for 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
Posted: 01 Mar 2023 | Published: 02 Mar 2023
|
|
|
6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
|
Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE:
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008
|
|
|
Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER:
This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006
|
|
|
Breaking Down JSON Web Tokens
sponsored by FusionAuth
EBOOK:
This eBook explores JSON Web Tokens (JWTs), detailing their structure, security, and best practices. Learn about JWT components, revocation strategies, and performance. Discover when and how to use JWTs in authentication systems. Read this eBook to deepen your understanding of this powerful token format.
Posted: 14 Mar 2025 | Published: 15 Mar 2025
|
|
|
Go Beyond HIPAA Compliance with a Data Privacy Vault
sponsored by Skyflow
WHITE PAPER:
This white paper explores how Skyflow's Healthcare Data Privacy Vault goes beyond HIPAA compliance, using isolation, tokenization, and redaction to secure health information. Learn to implement robust data governance and enhance HIPAA compliance. Read the paper for insights.
Posted: 15 Mar 2025 | Published: 15 Mar 2025
|
All resources sponsored by Skyflow
|
|
CW Europe - December 2020-February 2021: Tour de France fans get a virtual experience
sponsored by TechTarget ComputerWeekly.com
EZINE:
The organisers of this year's Tour de France worked with technology services company NTT in partnership with Amaury Sport Organisation to provide what they described as an "enhanced experience" for race fans who could not be at the roadside because of Covid restrictions.
Posted: 08 Feb 2021 | Published: 10 Dec 2020
|
|
|
The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK:
This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|
|
Artificial Intelligence (Ai) Components That Power Interaction Analytics
sponsored by Intermedia.Net
INFOGRAPHIC:
This infographic explores the AI components that power Interaction Analytics, including Natural Language Processing, Sentiment Analysis, and more. Access the infographic to learn how these AI technologies can help your team identify service enhancements, sales opportunities, and organizational improvements.
Posted: 08 Jan 2025 | Published: 14 Jan 2025
|
|
|
10 examples of the metaverse for IT and business leaders
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Plenty of companies want to get in on the money-making potential of what has been dubbed the metaverse. Here are enterprise-focused and consumer-focused examples that business and IT leaders may want to explore.
Posted: 16 Oct 2022 | Published: 17 Oct 2022
|
|
|
Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018
|
|
|
Securing AI workloads on Dell PowerEdge with Intel® Xeon® processors using Intel® Trust Domain Extensions
sponsored by Dell Technologies & Intel
WHITE PAPER:
This technical white paper offers guidance on implementing strong security measures and achieving peak performance for AI workloads. It focuses on two features provided by the 5th generation Intel® Xeon® processor: implementing advanced security measures using Intel® TDX and leveraging an AI accelerator called Intel® AMX.
Posted: 26 Feb 2025 | Published: 21 Feb 2025
|
|
|
Securing AI workloads on Dell PowerEdge with Intel® Xeon® processors using Intel® Trust Domain Extensions
sponsored by Dell Technologies & Intel
WHITE PAPER:
This technical white paper offers guidance on implementing strong security measures and achieving peak performance for AI workloads. It focuses on two features provided by the 5th generation Intel® Xeon® processor: implementing advanced security measures using Intel® TDX and leveraging an AI accelerator called Intel® AMX.
Posted: 21 Feb 2025 | Published: 21 Feb 2025
|
|
|
The future of API management: Key trends for IT leaders
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As enterprises accelerate digital transformation, API management has become increasingly complex. IT leaders must navigate an evolving landscape where efficiency, security, and modernisation intersect. This e-guide explores API management trends, including the challenges of API security, and the impact of genAI.
Posted: 20 Mar 2025 | Published: 20 Mar 2025
|
|
|
Identity Security for Software Development
sponsored by CyberArk
EBOOK:
Whether you’re just starting your coding journey or a seasoned veteran, this e-book serves as a comprehensive resource for those who want to develop a deep understanding of secure coding principles and best practices. Read the O’Reilly e-book to understand today’s identity security and secure development essentials.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
|
The LLM Mesh: A Practical Guide to Using Generative AI in the Enterprise
sponsored by Dataiku
EBOOK:
This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.
Posted: 30 Aug 2024 | Published: 30 Aug 2024
|
|
|
9 Common Cryptocurrency Scams in 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Even though cryptocurrency is a newer trend, thieves are using old methods to steal. Here are some of the common cryptocurrency scams to watch out for.
Posted: 14 Sep 2022 | Published: 14 Sep 2022
|
|
|
The Definitive Guide to Serving Open Source Models
sponsored by Predibase
EBOOK:
This e-book explores strategies for optimizing small language model inference, covering reliability, performance, and cost efficiency. Learn about GPU autoscaling, Turbo LoRA, FP8 quantization, and LoRA Exchange for better throughput and resource management. Discover how to build robust AI infrastructure for enterprise deployments.
Posted: 09 Mar 2025 | Published: 10 Mar 2025
|
|
|
A More Secure Alternative
sponsored by Google Workspace
WHITE PAPER:
No organization is truly immune from state-sponsored cyber-attacks, and the severity of such threats on enterprise cloud and workspace environments cannot be understated. To understand how the security features of workspaces from cloud service providers like Microsoft and Google stack up in this climate, read the following paper.
Posted: 12 Mar 2025 | Published: 12 Mar 2025
|
|
|
The Big Book of Genai 5 Ways to Leverage Your data to build Production-Quality GenAl Applications
sponsored by DataBricks
EBOOK:
This 118-page e-book is a thorough guide to deploying GenAI applications. It details the entire GenAI process, from using foundation models to custom model pretraining and fine-tuning. Access the full e-book now to learn how you can unlock the potential of GenAI for your organization.
Posted: 07 May 2024 | Published: 21 Feb 2025
|
|
|
Recruiting Email Outreach Benchmarks and Best Practices
sponsored by GEM
EBOOK:
Discover best practices for effective recruiting email outreach, including optimal send times, subject lines, and message content. Access this e-book to learn how to personalize your messaging, use data to drive results, and elevate your talent acquisition strategy.
Posted: 04 Dec 2024 | Published: 05 Dec 2024
|
|
|
2 types of endpoint encryption to protect data
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Posted: 04 May 2022 | Published: 04 May 2022
|
|
|
Authentication Best Practices: On and Off the Cloud
sponsored by HID Global
EGUIDE:
Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 08 Feb 2021 | Published: 12 Oct 2016
|
|