Search Results for: security

Biometrics in the enterprise: An opportunity or an ethical minefield?
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

TechTarget ComputerWeekly.com

CIO Trends #11: Benelux
The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

TechTarget ComputerWeekly.com

CIO Trends #11: Benelux
The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

TechTarget ComputerWeekly.com

Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.

Cato Networks

Shields up! Why Russia's war on Ukraine should matter to security pros
The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

TechTarget ComputerWeekly.com

Royal Holloway: Corporate under-reporting of cyber crime
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.

TechTarget ComputerWeekly.com

Is FDE Enough to Thwart "Evil Maid" Attacks?
In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.

Dimension Data

How long does it take to get owned?
A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.

TechTarget ComputerWeekly.com

Data protection: A business imperative
In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.

TechTarget ComputerWeekly.com

Application security: More important than ever
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

TechTarget ComputerWeekly.com