ISSA Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Rise in Ransomware Attacks Prompts New Prevention Priorities
sponsored by Cisco Umbrella
EGUIDE: Officials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Cisco Umbrella

The Transformational CISO’s Guide to Security Orchestration, Automation and Response
sponsored by Splunk
EBOOK: Download your complimentary copy of “The Transformational CISO’s Guide to Security Orchestration, Automation and Response (SOAR)” to learn the four qualities of a CISO executives value most, and how SOAR can help many of the biggest challenges facing CISOs.
Posted: 19 Aug 2022 | Published: 19 Aug 2022

TOPICS:  .NET
Splunk

How To Achieve Risk-Based Vulnerability Management
sponsored by AT&T Cybersecurity
WHITE PAPER: Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

AT&T Cybersecurity

Globe GFiber Prepaid: Making Fiber Broadband Accessible To All Filipinos
sponsored by LotusFlare Inc
PRODUCT OVERVIEW: To learn how Globe Telecom created a prepaid offering within the fiber broadband market, and to consider the outcomes of the product, download this case study.
Posted: 16 Sep 2023 | Published: 16 Sep 2023

TOPICS:  .NET
LotusFlare Inc

The 10 ways to anticipate, eliminate, and defeat cyberthreats
sponsored by ServiceNow
EBOOK: Your business is forced to defend against actual cyberthreats and potential ones. So, how can you bolster your security stance in the face of all these risks? Check out this e-book to discover 10 ways that a cloud-based platform with an integrative approach can help you do so.
Posted: 06 Jul 2023 | Published: 06 Jul 2023

TOPICS:  .NET
ServiceNow

How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE: This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

TaaSera

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

TechTarget ComputerWeekly.com

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by TechTarget Security
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

TechTarget Security

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Wisegate

Tips on Managing the Deluge of Information Security Threat Reports
sponsored by TechTarget Security
EGUIDE: Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

TechTarget Security

Cloud Risk Management: Governance Strategies to Protect Digital Assets
sponsored by TechTarget Security
EBOOK: In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Security

Transform to Better Perform: Evolve Your Data Center
sponsored by Dimension Data
WHITE PAPER: Modern business changes fast. Learn how aging infrastructure stifles innovation and growth to hold your company back.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

TOPICS:  IT Management
Dimension Data

The Ultimate Guide to Ransomware and Cybersecurity Planning
sponsored by Infinidat
EGUIDE: Read through this comprehensive e-guide for everything you need to know about cybersecurity planning for ransomware: types of attacks, common attack vectors, prevention methods and tools, best practices for recovery, and more.
Posted: 25 Sep 2023 | Published: 25 Sep 2023

TOPICS:  .NET
Infinidat

The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 08 Feb 2021 | Published: 25 Oct 2019

ServiceNow

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
Posted: 07 Nov 2011 | Published: 04 Nov 2011

TechTarget ComputerWeekly.com

Protecting Applications, Data, and Users with Next-Generation CASB
sponsored by Palo Alto Networks
ESG: With hundreds of SaaS applications, each with a unique mix of settings, it can be difficult for IT and security teams to ensure resources are properly configured, protected, and compliant. Download this ESG white paper to explore today’s changing IT environments in detail and unlock key attributes for next-generation CASBs.
Posted: 24 Mar 2023 | Published: 25 Mar 2023

TOPICS:  .NET
Palo Alto Networks

CIO Decisions E-zine: May 2014
sponsored by TechTarget CIO
EZINE: Innovations of the new mobility age, including the connected car, mean that CIOs need to reframe their mobile strategy with a customer-focused slant.
Posted: 05 May 2014 | Published: 07 May 2014

TechTarget CIO

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine

Computer Weekly 13 September 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news, trends and IT management issues
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the man tasked with bringing public services into the digital age. The second installment of our Buyer's Guide to business intelligence reviews two low-cost alternatives to the big suppliers; and we go behind the scenes of the IT preparations for the London 2012 Olympic Games.
Posted: 12 Sep 2011 | Published: 13 Sep 2011

TechTarget ComputerWeekly.com

Data Center Evolution in the Era of the Cloud
sponsored by Dimension Data
WHITE PAPER: Data centers are crucial to the changing business world. Learn to handle growing data, add new applications and more.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

TOPICS:  IT Management
Dimension Data

New Mobile Risks Call for a Layered Security Approach
sponsored by TechTarget CIO
EBOOK: As enterprises' mobile footprints grow, so do the security risks. A single-pronged security approach is no longer enough. Download this handbook to discover how to build a layered enterprise mobile security strategy.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

TOPICS:  CIOs
TechTarget CIO

Security Operations Use Case Guide
sponsored by ServiceNow
EBOOK: The skills shortage and increasing cyberattacks continue to challenge security teams, slowing their responses to security incidents. To help teams avoid disaster, ServiceNow developed Security Operations and the Now Platform. Learn about how these solutions work in this guide.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET
ServiceNow

The Economic Benefits of Palo Alto Networks Industrial OT Security
sponsored by Palo Alto Networks
ESG ECONOMIC VALIDATION REPORT: Due to their lack of built-in security, OT assets – such as critical smart devices – tend to be highly susceptible to cyberattacks. In the face of increasingly complex cyberthreats, how can you level up your business’s OT cybersecurity? Unlock guidance in this Economic Validation report by TechTarget’s Enterprise Strategy Group (ESG).
Posted: 03 Nov 2023 | Published: 03 Nov 2023

TOPICS:  .NET
Palo Alto Networks

MicroScope – April 2023: The benefits of security accreditations
sponsored by MicroScope
EZINE: In this month's MicroScope ezine, we look at how industry-recognised certifications can strengthen business defences. We also see how ChatGPT offers the channel a chance to level the playing field. Read the issue now.
Posted: 31 Mar 2023 | Published: 07 Apr 2023

MicroScope

September Information Security Magazine
sponsored by TechTarget Security
EZINE: Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

TechTarget Security