Search Results for: security

Modernizing Security: Proactive PAM Solutions for Today
In every enterprise IT environment, privileged accounts are instrumental in empowering administrators to manage the system effectively. However, the inherent risks associated with granting privileged access, as underscored in many of today's headlines, raise significant concerns for any organization, regardless of size or industry.

TOPICS: Security
One Identity

Why zero trust is IT security's best hope
This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

TechTarget ComputerWeekly.com

Focus: IT Security in the Middle East
In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.

TechTarget ComputerWeekly.com

CW ASEAN: Time to dial up defences
In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

TechTarget ComputerWeekly.com

Protect the Endpoint: Threats, Virtualization, Questions, Backup, and More
Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

Carbon Black

DDoS Mitigation: Types of DDoS Attacks and Security Considerations
Our experts discuss various DDoS mitigation services and what your organization should consider before implementing cloud DDoS protection. Then, uncover the various types of DDoS attacks and the steps to take towards a more secure and reliable future.

Arbor Networks

Getting Cloud Security Right
In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

TechTarget ComputerWeekly.com

Cybersecurity resilience in an era of identity sprawl
As a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.

TOPICS: Security
One Identity

Protecting your organisation from itself
This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

TechTarget ComputerWeekly.com

Royal Holloway: Purple team playbook – threat modeling for security testing
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

TechTarget ComputerWeekly.com