This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
In this video, discover how IT service management's competitive landscape is evolving—and not just focusing on solely the cloud or an on-premise environment. A vendor who provides a hybrid solution will be the one that comes out on top in the end, due to flexibility and scalability.
This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines