Search Results for: %3Ca href%3D%22%22%3E%3C%2Fa%3E

   All     White Papers   Multimedia   IT Downloads 
11 - 20 of 9082 Matches Previous Page  |  Next Page
Top 10 Ransomware from 2017
Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report. This report analyzes the ransomware lifecycle and takes a look at the attacks that negatively impacted businesses worldwide.

Versa Networks

Forrester: Total Economic Impact of FlashArray FA-400 Series
Access this document for Forrester's independent evaluation of Pure Storage's latest flash array series.

Pure Storage

Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security
This presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.

IBM

Global Internationalized Domain Name Homograph Report
Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.

Farsight Security

What is SOAR, Exactly?
A SOAR platform incorporates many different functions and activities. These functions including orchestration, automation incident management and report. In this white paper, learn about main requirements for each function in a SOAR. Also, explore how SOAR tools can help organizations to meet their goals.

D3 Security

HP Data Protector 6.1 Software: VMware Integration Installation Best Practice
This white paper provides information on how to plan and install the HP Data Protector VMware Integration in different ways.

Hewlett-Packard Company

CW+: Business opportunities in the North American mobile market
In May, 2010, Verizon Wireless told investors at Barclays Capital media and technology conference in New York that it expected to offer customers who signed up for its 4G services monthly “buckets” of data.

ComputerWeekly.com

The Hacker Report
Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.

HackerOne

Deploying NGINX Plus as an API Gateway
In this resource, explore a converged approach to API management that manages web traffic with ease, translates between protocols and provides consistent configuration and monitoring interfaces.

NGINX

CIO Trends #2
Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.

TOPICS: CIOs
ComputerWeekly.com
11 - 20 of 9082 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement