Web Site Security Reports

Royal Holloway: Attack mapping for the internet of things
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
Posted: 13 May 2022 | Published: 13 May 2022

TechTarget ComputerWeekly.com

European Perceptions, Preparedness and Strategies for IoT Security
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
Posted: 08 Feb 2021 | Published: 12 Jul 2017

TechTarget ComputerWeekly.com

IoT & the Enterprise: Exploring Opportunities and Challenges in Asia
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.
Posted: 08 Feb 2021 | Published: 26 Jun 2017

TechTarget ComputerWeekly.com

Simplify SSL Certificate Management Across the Enterprise
sponsored by Symantec Corporation
WHITE PAPER: Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
Posted: 07 May 2012 | Published: 07 May 2012

Symantec Corporation

The real need for distributed denial-of-service protection: How to stop DDoS attacks
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

TechTarget Security

How to Handle the IoT from the Data Center to Security
sponsored by Xively by LogMeIn
EGUIDE: In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Xively by LogMeIn

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by TechTarget Security
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Security

How Web Security Improves Productivity and Compliance
sponsored by OpenText Security Solutions
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 15 May 2013 | Published: 31 Dec 2012

OpenText Security Solutions

How Healthcare Organizations are Tackling IoT Device Management
sponsored by Cisco Umbrella
EGUIDE: Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco Umbrella

Imperva's Web Application Attack Report
sponsored by Imperva
WHITE PAPER: Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 04 Apr 2012 | Published: 02 Jan 2012

Imperva