Search Results for: security

Learn New Techniques For Preventing Data Loss In The Cloud
This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.

Symantec & Blue Coat Systems

CW EMEA July 2023: Can we trust AI?
Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.

TechTarget ComputerWeekly.com

Manchester United praised for swift response to cyber attack
The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

TechTarget ComputerWeekly.com

Royal Holloway: Cloud-native honeypot deployment
Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

TechTarget ComputerWeekly.com

Threat management: Essential guide
Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

TechTarget ComputerWeekly.com

How Do Vulnerabilities Get Into Software?
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

Veracode, Inc.

CIO Trends #6: Nordics
In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.

TechTarget ComputerWeekly.com

A guide to build vs. buy service models for threat detection and response
Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.

AT&T Cybersecurity

The currency of trust: why banks and insurers must make customer data safer and more secure
Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

TechTarget ComputerWeekly.com

Don't Let Complacency Allow Mobile Threats Breach Your Enterprise
In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.

Lookout