Search Results for: security

Sandnet++ – A framework for analysing and visualising network traffic from malware
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware

TechTarget ComputerWeekly.com

What Is The Next Step For Next-Gen Antivirus?
Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.

Palo Alto Networks

5 endpoint security best practices
With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.

TechTarget ComputerWeekly.com

Can Lady Gaga and Madonna get people to take security seriously
What does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. Read more in this PDF.

TechTarget ComputerWeekly.com

Making the case for cloud-based security
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

TechTarget ComputerWeekly.com

Making the case for cloud-based security
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

TechTarget ComputerWeekly.com

Jargon Buster Guide to Post Quantum Cryptography
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

TechTarget ComputerWeekly.com

Trust no one: Why zero trust security is taking the world by storm
As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

TechTarget ComputerWeekly.com

Application security: best practices and risks
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

TechTarget ComputerWeekly.com

7 best practices for Web3 security risk mitigation
Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.

TechTarget ComputerWeekly.com