User ID Reports

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 15 Mar 2021 | Published: 19 Feb 2021

TechTarget ComputerWeekly.com

Top 11 cloud security challenges and how to combat them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER: When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER: Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Nevis Networks

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola Solutions

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

Citrix GoToMyPCCorporate - Security White Paper
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
Posted: 19 Jun 2008 | Published: 01 Jan 2006

Citrix Online - GotoMyPC

Cisco Aironet 1300 Series Outdoor Access Point/Bridge
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: The Cisco® Aironet® 1300 Series Outdoor Access Point or Bridge is an 802.11g access point and bridge that provides high-speed and cost-effective wireless connectivity between multiple fixed or mobile networks and clients.
Posted: 10 Jul 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.