Search Results for: security

Jargon Buster Guide to Post Quantum Cryptography
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

TechTarget ComputerWeekly.com

Trust no one: Why zero trust security is taking the world by storm
As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

TechTarget ComputerWeekly.com

Intergrated Mobile Security for Small and Midsize Businesses
This resource demonstrates how small and medium-sized business can combat the rapidly growing threats inherent in mobile computing. Read now to learn how cloud-based mobile protection can offer robust mobile protection while delivering noticeablecost efficiencies.

TechTarget Security

Application security: best practices and risks
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

TechTarget ComputerWeekly.com

7 best practices for Web3 security risk mitigation
Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.

TechTarget ComputerWeekly.com

Best Practices for Improving Mobile Data Security
This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.

TechTarget Security

The State of Cloud Native Security
As more and more applications are migrated into the cloud, and organizations focus less on their own on-premises hardware, countless cloud and app security questions have arisen. This State of Cloud Native Security Report delves into the current market landscape for cloud and cloud-native security.

Palo Alto Networks

MicroScope – February 2023: Opportunities in security
In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it

MicroScope

BadUSB 2.0: Exploring USB man-in-the-middle attacks
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.

TechTarget ComputerWeekly.com

In 2017, the insider threat epidemic begins
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

TechTarget ComputerWeekly.com