Search Results for: %3Ca href%3D%22%22%3E%3C%2Fa%3E

   All     White Papers   Multimedia   IT Downloads 
11 - 20 of 9299 Matches Previous Page  |  Next Page
Forrester: Total Economic Impact of FlashArray FA-400 Series
Access this document for Forrester's independent evaluation of Pure Storage's latest flash array series.

Pure Storage

Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security
This presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.

IBM

The Cost of Credential Stuffing
Credential stuffing attacks can cause loss of customers and involvement of IT security that can result in an average cost of $1.2 million, according a Ponemon Institute survey. To gain a better understanding of the cost to prevent, detect and remediate credential stuffing attacks download this Ponemon Institute study.

Akamai

Global Internationalized Domain Name Homograph Report
Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.

Farsight Security

What is SOAR, Exactly?
A SOAR platform incorporates many different functions and activities. These functions including orchestration, automation incident management and report. In this white paper, learn about main requirements for each function in a SOAR. Also, explore how SOAR tools can help organizations to meet their goals.

D3 Security

HP Data Protector 6.1 Software: VMware Integration Installation Best Practice
This white paper provides information on how to plan and install the HP Data Protector VMware Integration in different ways.

Hewlett-Packard Company

CW+: Business opportunities in the North American mobile market
In May, 2010, Verizon Wireless told investors at Barclays Capital media and technology conference in New York that it expected to offer customers who signed up for its 4G services monthly “buckets” of data.

ComputerWeekly.com

The Hacker Report
Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.

HackerOne

CIO Trends #2
Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.

TOPICS: CIOs
ComputerWeekly.com

A Guide to All-Flash Storage Arrays
In this guide, the products of both old and new all-flash vendors are discussed and reviewed.

ComputerWeekly.com
11 - 20 of 9299 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement