Unifying Data Protection with McAfee
By: McAfee, Inc. View more from McAfee, Inc. >>
Download this next:
Top MITRE ATT&CK techniques from criminal/APT groups
By: McAfee
Type: Research Content
McAfee’s latest report incorporates not only the malware zoo, but new analysis for what’s being detected in the wild.
It also covers:
- Threats to sectors and vectors
- Sunburst malware and the SolarWinds supply chain compromise
- Top MITRE ATT&CK techniques in Q4 2020 from criminal/APT groups
- And much more
Download the full report to uncover it all.
These are also closely related to: "Unifying Data Protection with McAfee"
-
Top 10 IT security stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here’s a look back over Computer Weekly’s top 10 IT Security stories of 2018.
-
9 essential elements of network security
By: TechTarget ComputerWeekly.com
Type: eGuide
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Find more content like what you just read:
-
Mobile Security: A global perspective on emerging mobile security issues
By: TechTarget Security
Type: Ezine
This in-depth expert guide examines the mobile security issues that arise as organizations seek to empower their workers and connect better with consumers through increased enterprise mobility.
-
CIO Trends #11: Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.
-
CIO Trends #11: Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.
-
Remediating IT vulnerabilities: Quick hits for risk prioritization
By: TechTarget Security
Type: eGuide
There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.
-
CW APAC, June 2020: Trend Watch - data protection
By: TechTarget ComputerWeekly.com
Type: Ezine
Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
-
How to integrate SaaS with CASB
By: Palo Alto Networks
Type: Analyst Report
Today, organizations rely on the cloud for core business applications and data, but a layered approach has also increased complexity and brings new challenges. This ESG report digs into how integrating CASB with SaaS security providers aims to address these challenges by delivering key capabilities. Read on to get started.
-
Protecting applications, data and users with next-generation CASB
By: Palo Alto Networks
Type: ESG
With hundreds of SaaS applications, each with a unique mix of settings, it can be difficult for IT and security teams to ensure resources are properly configured, protected, and compliant. Download this ESG white paper to explore today’s changing IT environments in detail and unlock key attributes for next-generation CASBs.
-
SASE: The driver of your SaaS security journey
By: Palo Alto Networks
Type: White Paper
SaaS applications have become popular in recent years due to their widespread availability, ease of use, and low costs – but they’re not always secure. In this white paper, you will learn about how a SASE solution is designed to assist your cloud transformation and safely adopt SaaS applications. Download now to learn about solution benefits.
-
Endpoint and antimalware protection for small to large businesses
By: Carbon Black
Type: eGuide
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
-
Cloud Security, Enhanced: Attack Path Analysis to Identify the Critical Risks in Your Hybrid Cloud
By: Panoptica
Type: Product Overview
Legacy CSPM does not have the capacity to make the right connections between security findings to provide the security insights that organizations require. Powered by graph-based technology, Panoptica’s Attack Path Engine prioritizes and offers dynamic remediation for vulnerable attack vectors. Read on to learn more.
-
Print security: An imperative in the IoT era
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Analyst group Quocirca gives the perspective on the risks and best practices of print security.
-
A guide to the zero-trust security journey
By: Reply
Type: eBook
The distributed nature of the modern network has made traditional security methods based on the principle of a “perimeter” obsolete. A zero trust IT security model should be part of an integrated approach that includes the entire end-to-end digital estate, overcoming the challenges of the traditional perimeter. Read on to learn more.
-
Top Mobile Data Protection Best Practices
By: TechTarget Security
Type: eGuide
Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
-
Hacking the Human Operating System
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
eGuide: Information Security - Buyer's Guide to Messaging Security
By: TechTarget Security
Type: eGuide
Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
-
ESG Report: Analyzing the economic benefits of cyber resilience with Commvault Cloud
By: Commvault
Type: ESG Economic Validation Report
Enterprise Strategy Group analyzed Commvault Cloud, powered by Metallic AI, and interviewed current customers to understand its impact on IT and business goals. The analysis revealed potential financial benefits in 3 areas: cost efficiency, increased agility, and reduced risk. Download the report now to learn more.
-
Mobile data protection best practices
By: TechTarget Security
Type: eGuide
Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.
-
An effective mobile device security policy
By: TechTarget Security
Type: eGuide
Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.
-
Start Your SASE Journey with Cloud SWG
By: Palo Alto Networks
Type: White Paper
Organizations are desperately searching for a security strategy capable of meeting the new demands of this reality. SASE has widely been touted as the gold-standard, but many don't know where to begin. Read this white paper, which looks at how Palo Alto's Cloud Secure Web Gateway (SWG) aims to help organizations start their SASE journey.
-
Computer Weekly – 2 May 2017: How to deal with data under GDPR
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
-
IT Decision Checklist: Messaging Security
By: TechTarget Security
Type: eGuide
Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
-
CW APAC, April 2022: Trend Watch: Cyber security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access
-
Focus: how to avoid being hit by ransomware
By: TechTarget ComputerWeekly.com
Type: eGuide
In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
-
MicroScope January 2014: A special issue looking at software defined networking
By: TechTarget Security
Type: Ezine
The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
-
Computer Weekly - 10-16 September 2019: A tech boost for social care
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
-
E-Guide: New Malware Threats Require New Antimalware Protection Strategy
By: TechTarget Security
Type: eGuide
This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
-
Computer Weekly – 24 October 2017: Where will AI take us?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
-
Proactive security measures: How to prevent malware attacks
By: TechTarget Security
Type: eGuide
Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource.
-
Debunking APT myths: What it really means and what you can do about it
By: TechTarget Security
Type: eGuide
This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.
-
Computer Weekly 15 October 2019: Securing the internet of things
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
-
Uber and Volkswagen: Handling ethics in IT
By: TechTarget ComputerWeekly.com
Type: Ezine
Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
-
Your GDPR guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
-
Getting Cloud Security Right
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
-
CIO Trends APAC: Developing a data-driven culture
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.
-
Enterprise Data Loss Prevention, Revisited
By: Palo Alto Networks
Type: Analyst Report
To protect data assets both in motion and at rest, a modern approach to data loss prevention (DLP), designed for today’s digital enterprise, is paramount. Read this exclusive ESG white paper to learn more about rethinking DLP for the modern workflow.
-
SSE Leads the Way to SASE
By: Zscaler
Type: ESG Research Report
By providing modern security capabilities with less disruption, SSE frameworks make an excellent stepping stone to a complete SASE implementation. This report from Enterprise Strategy Group provides a thorough analysis of today's secure digital transformation journeys and the SASE market Get your copy today to find out more.
-
A Computer Weekly buyer's guide to post-Covid-19 supply chain management
By: TechTarget ComputerWeekly.com
Type: eGuide
The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.
-
February Essentials Guide on Threat Management
By: TechTarget Security
Type: Essential Guide
Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.
-
12 security orchestration use cases
By: Palo Alto Networks
Type: White Paper
Security orchestration connects disparate security tools, teams and infrastructures for seamless, process-based security operations and incident response. This connectedness makes it a good enabler of security automation. Download this white paper for a comprehensive look at this and 11 other security orchestration use cases.
-
July Essentials Guide on Cloud Computing
By: TechTarget Security
Type: eBook
This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
By: TechTarget Security
Type: Essential Guide
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
ISM Essentials Guide – Threat Management
By: TechTarget Security
Type: Essential Guide
In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
-
MITRE ATT&CK, a guide for businesses in 2022
By: TechTarget ComputerWeekly.com
Type: eBook
Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.
-
What can CIOs do about the skills shortage in ASEAN?
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.
-
Buyer's Guide to Antimalware
By: TechTarget Security
Type: eGuide
Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
-
Focus: IT Security in the Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
-
CW Middle East Oct to Dec 2016
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.