INCITS White Papers

(View All Report Types)
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Under new cloud management: What the future holds for AWS
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at some of the challenges facing AWS in greater detail, while also taking a closer look at what the future might hold for AWS under the charge of its new CEO, and how its customers are choosing to consume its technology in 2021.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com

The Evolution of Threat Detection and Management
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

TechTarget Security

Under new cloud management: What the future holds for AWS
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at some of the challenges facing AWS in greater detail, while also taking a closer look at what the future might hold for AWS under the charge of its new CEO, and how its customers are choosing to consume its technology in 2021.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by TechTarget Security
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

TechTarget Security

Build a strong network security foundation
sponsored by TechTarget Networking
EGUIDE: Network security presents a vast array of security concerns for the modern IT security team, and with so many different topics falling under its umbrella, it is important to stay informed on the myriad issues concerning network security. This buyer's guide combines 3 articles on different key areas of modern network security. Read on to learn more.
Posted: 26 Oct 2022 | Published: 17 Oct 2022

TOPICS:  .NET
TechTarget Networking

How to Keep Each Cloud Workload Accessible and Secure
sponsored by Interactive
EBOOK: While the shared responsibility model of cloud security is still relevant, responsibility for keeping cloud workloads safe is increasingly falling more on the shoulders of the in-house security team and management. Download this handbook for everything you need to know about keeping your cloud workloads accessible and secure.
Posted: 20 Jan 2021 | Published: 29 Jan 2020

Interactive

CW Benelux November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
Posted: 08 Feb 2021 | Published: 09 Nov 2017

TechTarget ComputerWeekly.com

Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK: This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

E-Book: Game-changing business analytics trends for 2011 and beyond
sponsored by Actian Corporation
EGUIDE: This expert e-guide is a collection of recent articles that focus on the latest business intelligence (BI) trends, practices and tools.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

Actian Corporation

MicroScope – July 2023: The pressure to deliver
sponsored by MicroScope
EZINE: With technology always changing, it can feel like an impossible feat to keep up – we speak to experts about how the channel handles rapid change and the pressure this places on partners to meet customer expectations. Also read about major themes of the market and how the topic of return on investments needs to stretch beyond economics
Posted: 06 Jul 2023 | Published: 07 Jul 2023

MicroScope

Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly – 24 October 2017: Where will AI take us?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
Posted: 08 Feb 2021 | Published: 24 Oct 2017

TechTarget ComputerWeekly.com

Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by TechTarget Security
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

TechTarget Security

Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com

Enterprise Decisions E-Zine Feature: How mobile IT is revamping network strategies
sponsored by TechTarget CIO
EZINE: Inside this edition of CIO Decisions E-zine, find out how your peers are keeping up with consumerization trends. Uncover practical network management advice from the experiences of several high-profile organizations.
Posted: 07 Nov 2012 | Published: 07 Nov 2012

TechTarget CIO

MicroScope: Chart course to Covid-19 recovery
sponsored by MicroScope
EZINE: Customers have had to react to changes caused by the pandemic, so what decisions have they made in the past year? In this issue, we explore how businesses have adapted to the new normal, different approaches to remote working, and take a look at the challenge of sustainability
Posted: 08 Apr 2021 | Published: 09 Apr 2021

MicroScope

Threatlabz 2023 State of Encrypted Attacks Report
sponsored by Zscaler
RESEARCH CONTENT: A vast majority of today's cyberattacks use encryption to bypass defenses. The Zscaler ThreatLabz team analyzed data from the world's largest security cloud to uncover what threats are hiding in SSL/TLS. Learn how the encrypted threat landscape has evolved and what you can do about it in the recent ThreatLabz report, The State of Encrypted Attacks.
Posted: 04 Jan 2024 | Published: 05 Jan 2024

TOPICS:  .NET
Zscaler

eBook: Virtualization Security
sponsored by TechTarget
EBOOK: Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of virtualization security.
Posted: 21 May 2009 | Published: 21 May 2009

TechTarget

eBook: Strategies for Securing Virtual Machines
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

Information Security Magazine

Threat Detection (Antivirus Intrusion Prevention)
sponsored by TechTarget Security
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

TechTarget Security

Gartner IT Financial, Procurement & Asset Management Summit 2013
sponsored by Gartner
BROCHURE: This brochure outlines the Gartner IT Financial, Procurement & Asset Management Summit 2013, a conference that aims to help you destroy legacy costs and create value from new technologies and trends. View now to learn more!
Posted: 19 Jul 2013 | Published: 19 Jul 2013

Gartner

Establishing a Formal Cyber Intelligence Capability
sponsored by Verisign, Inc.
WHITE PAPER: While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
Posted: 03 May 2012 | Published: 03 May 2012

Verisign, Inc.

Information Security Magazine: June Issue
sponsored by TechTarget Security
EZINE: In this issue of Information Security magazine, we look at how malware is adapting to virtual machines and strategies that can help organizations secure these environments.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

TechTarget Security

Exploiting Big Data: Strategies for Integrating with Hadoop to Deliver Business Insights
sponsored by BeyeNETWORK
EBOOK: This e-book, penned by business intelligence expert Wayne Eckerson, will explain how big data -- the combination of Hadoop and analytical databases -- is transforming the business intelligence industry.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

BeyeNETWORK

Computer Weekly - 23 August 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news and IT trends
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Oxfam's CIO talks about how IT supports a global aid operation; we ask if £530m government funding will be enough to roll-out superfast broadband; we examine the security issues around moving to IPv6; plus our analysis of the week’s biggest news stories in IT. Download the latest issue now.
Posted: 22 Aug 2011 | Published: 23 Aug 2011

TechTarget ComputerWeekly.com