Transport Layer Security Reports

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
Posted: 08 Feb 2021 | Published: 15 Mar 2017

TechTarget ComputerWeekly.com

Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

TechTarget ComputerWeekly.com

Computer Weekly – 30 May 2023: Can the UK cash in on chips?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
Posted: 26 May 2023 | Published: 30 May 2023

TechTarget ComputerWeekly.com

Focus: Cyber security in the Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 08 Feb 2021 | Published: 31 Jul 2017

TechTarget ComputerWeekly.com

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

A First Look at Securing Your Machine Identities With Certificates, PKI, and Secrets
sponsored by CyberArk
WEBCAST: Digital transformation, cloud adoption and AI are driving dramatic increases in machine identities, including TLS (Transport Layer Security) certificates and secrets. Watch this webinar to learn about why certificates and PKI matter and why organizations want to replace their legacy PKI.
Posted: 06 Jan 2025 | Premiered: Jan 6, 2025

CyberArk

CW Middle East ezine April 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.
Posted: 08 Feb 2021 | Published: 12 Apr 2018

TechTarget ComputerWeekly.com

How Kimberly-Clark reduced its SAP S/4HANA migration timeline by 25% with ActiveControl
sponsored by Basis Technologies
VIDEO: Kimberly-Clark, a leading consumer packaged goods company, needed to reduce the errors and time taken for manual transport sequencing during its SAP S/4HANA migration. In this video, you’ll find out why they decided to leverage ActiveControl to optimize and build business rules around the sequencing of transports. Tune in now to learn more.
Posted: 12 Mar 2025 | Premiered: 12 Mar 2025

TOPICS:  .NET
Basis Technologies

Bringing the application layer into cybersecurity monitoring and response
sponsored by Contrast Security
BLOG: The application layer is a major cybersecurity risk, yet it is largely invisible to traditional security tools. Application Detection and Response (ADR) provides visibility into the application layer, enabling faster incident response and reduced attacker dwell time. Read the blog to learn how ADR can address this critical security gap.
Posted: 14 Nov 2024 | Published: 15 Nov 2024

Contrast Security

Understanding ADR’s detection and response layers
sponsored by Contrast Security
BLOG: Explore how detection and response work together to maintain a strong cybersecurity posture, like airport security. Learn how Application Detection and Response (ADR) offers a solution to mitigate threats for software in production. Read more about ADR.
Posted: 14 Nov 2024 | Published: 15 Nov 2024

Contrast Security

How transport and logistics organisations can build agile and cyber resilient operations
sponsored by Vodafone
EBOOK: In this eBook, you’ll learn about what issues transport and logistics organizations are facing, key trends that are impacting the sector, and how technology can help these firms be better prepared to overcome the challenges of today and the future. Read the eBook here.
Posted: 01 Nov 2023 | Published: 01 Nov 2023

TOPICS:  .NET
Vodafone

Simplify Cloud Security with Red Hat and AWS
sponsored by Red Hat
PRODUCT OVERVIEW: Secure your hybrid cloud with consistent security policies across Red Hat Enterprise Linux and AWS. Learn how to mitigate risks, implement layered security, and streamline compliance. Download this product overview to discover the integrated security capabilities.
Posted: 13 Jun 2024 | Published: 13 Jun 2024

Red Hat

A Network Defense Layer That Actually Works
sponsored by Centripetal Networks
PRODUCT OVERVIEW: As cyber threats evolve, traditional firewalls alone are no longer sufficient. Centripetal's CleanINTERNET adds a critical external defense layer, leveraging advanced threat intelligence to detect and block threats in real-time. Download this blog to learn how a multi-layered security approach can enhance your enterprise's defense.
Posted: 13 Sep 2024 | Published: 14 Sep 2024

Centripetal Networks

Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016

TechTarget ComputerWeekly.com

The benefits of Application Detection and Response
sponsored by Contrast Security
VIDEO: In this video, Naomi Buckwalter, Senior Director of Product Security at Contrast Security, describes the blindspot security teams are grappling with: scant visibility into the application layer. Luckily, this is a blindspot that Contrast ADR eliminates.
Posted: 29 Jan 2025 | Premiered: 29 Jan 2025

Contrast Security

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

Wake up, CISOs: You need an ADR flashlight to see into critical application blindspots
sponsored by Contrast Security
BLOG: As cybercriminals increasingly target the application layer, CISOs need better visibility to detect and respond to threats. Learn how Contrast ADR provides application-layer security insights to reduce risk, accelerate response, and strengthen your security posture. Read the blog.
Posted: 10 Dec 2024 | Published: 11 Dec 2024

Contrast Security

Dutch IoT value still not understood
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Netherlands is a country where tech is being applied to all manner of business challenges and a magnet for tech innovators. So why, according to research, are almost 90% of businesses in the Netherlands barely aware of the competitive advantages the internet of things (IoT) can offer them? Read more about it in this issue.
Posted: 08 Feb 2021 | Published: 22 Aug 2019

TechTarget ComputerWeekly.com

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
Posted: 08 Feb 2021 | Published: 27 Oct 2017

TechTarget ComputerWeekly.com

Quickly scale anomaly detection across applications hosted in your AWS environment
sponsored by Contrast Security
PRODUCT OVERVIEW: Securing applications and APIs in the cloud is critical for financial services institutions undergoing digital transformation. Dig into this overview to learn how to extend AWS's security to the application layer.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Quickly Scale Anomaly Detection Across Applications Hosted In Your AWS Environment
sponsored by Contrast Security
PRODUCT OVERVIEW: Securing applications and APIs in the cloud is critical for financial services institutions undergoing digital transformation. Dig into this overview to learn how to extend AWS's security to the application layer.
Posted: 11 Sep 2024 | Published: 03 Oct 2024

Contrast Security

Application Detection and Response (ADR): Helping SecOps teams address NIST CSF
sponsored by Contrast Security
INFOGRAPHIC: This infographic explores how Application Detection and Response (ADR) can help security operations centers (SOCs) address the NIST Cybersecurity Framework, extending visibility into the application and API layer to identify and mitigate threats. Read the full infographic to learn more.
Posted: 14 Nov 2024 | Published: 15 Nov 2024

Contrast Security

Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019

TechTarget ComputerWeekly.com

The Definitive Guide To Container Security
sponsored by Palo Alto Networks
EBOOK: Securing container environments requires understanding tools and policies for protecting infrastructure, applications, and components. This guide explores container security across the lifecycle, from build to runtime, and offers a roadmap to prepare your environment and secure your containers. Read the full e-book to learn more.
Posted: 10 Dec 2024 | Published: 11 Dec 2024

Palo Alto Networks

November: The top attacks ADR caught on the brink of exploit
sponsored by Contrast Security
RESEARCH CONTENT: Applications and APIs face relentless threats, with an average of 50 confirmed attacks per app slipping past traditional defenses. Discover how Contrast ADR provides real-time application layer visibility to safeguard your systems.
Posted: 23 Jan 2025 | Published: 24 Jan 2025

Contrast Security

5 ways Contrast Security ADR closes the App and APIs gap in EDR, NDR and XDR tools
sponsored by Contrast Security
BLOG: Contrast Security's Application Detection and Response (ADR) solution provides deep visibility into the application layer, enabling security teams to detect and respond to otherwise invisible attacks. Learn how ADR can close the cybersecurity gap in EDR, NDR, and XDR tools. Read the article to learn more.
Posted: 14 Nov 2024 | Published: 15 Nov 2024

Contrast Security