How modern browsers stack up when it comes to security
By: Google View more from Google >>
Download this next:
Browser isolation: Your key to combatting cybercrime
By: Cradlepoint
Type: White Paper
Despite the ease and sophistication that browsers have brought to internet use, they also have become the target choice for cybercriminals looking to hack into your organization and personal data.
But why exactly is this? What makes browsers such good targets and how can your business best defend itself?
Dig into this white paper to gain more insight into the current cybercrime landscape and discover how tactics such as browser isolation can help you:
- Eliminate the browser as an attack surface to minimize the enterprise attack service overall
- Prevent credential theft by rendering websites in read-only mode
- And 6 more
These are also closely related to: "How modern browsers stack up when it comes to security"
-
Computer Weekly – 22 May 2018: GDPR is here – are you ready?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, the EU’s new data protection regulation, GDPR, comes into force this week – we ask if companies are ready and look at what happens if you’re not yet compliant. Our latest buyer’s guide examines digital transformation and the role of the CIO. And we find out how technology is changing the traditional sport of cricket.
Also featured:
- How Belgian public health consulting firm AEDES has worked with a local partner in the Democratic Republic of Congo to deliver a health information management system based on Couchbase.
- With browser-based applications growing in popularity, we consider how CIOs should approach the changing face of desktop IT.
- These days, 5G grabs all the hype and headlines, but 4G still has a lot more to give. It’s a good thing too, as operators have no choice but to sweat their assets.
-
Computer Weekly – 27 March 2018: The desktop is changing
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, corporate PCs haven’t changed much in 20 years – as use of Chrome OS grows, we ask if IT leaders are ready for a different approach. Theresa May said Brexit will mean the UK leaving the EU digital single market – does this mean a return to roaming charges? And we look at the latest developments in the leading versions of Linux. Read the issue now.
Find more content like what you just read:
-
The changing mobile platform landscape
By: TechTarget ComputerWeekly.com
Type: eGuide
So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
-
Data management for the distributed workforce
By: Panzura
Type: Product Overview
The challenges of data management, security, and access are nowhere felt more strongly than edge environments. This data sheet explores how Panzura Edge brings the resilience, security and access control of CloudFS to the distributed workforce across a number of use cases. Download now to learn more.
-
A Computer Weekly buyer's guide to the future of collaboration
By: TechTarget ComputerWeekly.com
Type: eGuide
Businesses are using collaborative software to operate in revolutionary new ways. In this 13-page buyer's guide, Computer Weekly looks at its potential negatives, the improved agility it provides and assesses Chromebooks as collaboration clients
-
The difficulties of defending against web tracking
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
-
Improved security and user experience with the Enterprise Browser
By: Island
Type: White Paper
Web browsers are designed to run third-party code directly on the endpoint. Many organizations use remote browser isolation (RBI) solutions to provide gateway infrastructure. Island saw the promise in these solutions, and decided to take them a step further, introducing them natively into their Enterprise Browser solution. Read on to learn more.
-
Sandnet++ – A framework for analysing and visualising network traffic from malware
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
-
Windows 10: How the client operating system is evolving
By: TechTarget ComputerWeekly.com
Type: eGuide
A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.
-
Security leader’s guide to AI-based scams
By: Gen Digital
Type: White Paper
The capabilities of large language models (LLMs) and generative AI are rapidly evolving. This white paper describes how hackers are utilizing generative AI to fuel cyberattacks, scams, and other social engineering related threats. Read on to learn more.
-
Computer Weekly – 21 August 2018: Delivering the potential of the internet of things
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.
-
Computer Weekly – 16 October 2018: Drilling into AI at Shell
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.
-
Top 10 IT security stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
Adobe Acrobat with Document Cloud Services Security Overview
By: Adobe
Type: White Paper
This white paper describes the defense-in-depth approach and security procedures implemented by Adobe to bolster the security of Adobe Acrobat with Document Cloud services and associated data.
-
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
By: TechTarget ComputerWeekly.com
Type: Research Content
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
-
Panda Adaptive Defense 360 Technologies
By: WatchGuard Technologies, Inc.
Type: White Paper
In an era of sophisticated ransomware and increasingly frequent cyberattacks, MSPs need to make sure they have comprehensive security capabilities. Access this white paper to learn how Panda Adaptive Defense 360 offers a full protection stack including endpoint protection technology, zero-trust defense, and contextualized behavior detection.
-
A guide to developing cloud applications using PaaS
By: TechTarget ComputerWeekly.com
Type: eBook
In this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.
-
The Ultimate Guide to Collaboration for Small and Mid-Market Businesses
By: Broadvoice
Type: eBook
With it being predicted that 36.2 million Americans will be working remotely by 2025, it has become critical for organizations to ensure that their collaboration solutions meet modern standards. But how can this best be done? Browse this e-book to learn more.
-
Data protection: A browser built for the enterprise
By: Island
Type: White Paper
Today’s most common web browsers were developed for a consumer’s need rather than the enterprise. This typical design threatens the security of critical data, including highly sensitive organizational assets. Discover why many
-
Digital signage playbook for manufacturing leaders
By: ScreenCloud
Type: White Paper
Do you want to improve employee engagement, performance, and operational efficiency in your manufacturing organization? It all starts with better communication! Browse this guide to learn more.
-
Containers in the enterprise: Use cases and latest developments
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we delve into the world of containers. We discover why many enterprises appear to be intent on using the technology to support the remodelling of their legacy applications in microservices. Also, we take a look at why interest in containers has risen thanks to enterprises moving from hybrid and multi-cloud environments.
-
A Computer Weekly buyer's guide to going beyond desktop Computing
By: TechTarget ComputerWeekly.com
Type: eGuide
A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.
-
Innovation Awards APAC 2023 - Transportation: Transdev Sydney Ferries
By: TechTarget ComputerWeekly.com
Type: eGuide
With public safety a top priority, Transdev Sydney Ferries realised it had to move to a 5G network infrastructure that could better provide the capacity and speed it needed. The decision has enabled the transport operator to shorten the time needed to analyse hours of video footage and resolve at least 70% of feedback within 2 business days.
-
How to implement the Essential Eight framework
By: Fortinet, Inc.
Type: eBook
To help organizations prevent and defend against evolving cyberthreats, the Australian Cyber Security Centre (ACSC) developed the Essential Eight framework. In this e-book, access an introduction to the framework and guidance for implementing it.
-
Why organizations struggle to manage contractor access
By: Island
Type: White Paper
The tools organizations offer to contractors can be overly complex, expensive, and ultimately not suited to the task of effective contractor access oversight. In this editorial brief, take a closer learn how approaching these problems at the
-
Modernize your VDI or DaaS strategy with an Enterprise Browser
By: Island
Type: White Paper
While Virtual desktop infrastructure (VDI) and desktop as a service (DaaS) are no longer capable of meeting the demands of modern organizations, the Enterprise Browser presents a simpler and more effective alternative. Download this white paper to learn how.
-
The Enterprise Browser: Reducing Your VDI Dependency
By: Island
Type: White Paper
While virtual desktop infrastructure (VDI) is widely used, it comes with a number of security concerns. Download this white paper to learn how Island’s Enterprise Browser presents a secure alternative to VDI and begin reducing your virtual desktop dependency today.
-
Island Enterprise Browser balances BYOD ease with data privacy
By: Island
Type: Product Overview
How can companies strike a BYOD balance for both UX and security? Read this product overview to evaluate the Island Enterprise Browser, which leverages policy-based governance and last-mile controls to ease BYOD rollout. Users can easily access corporate apps without compromising security, among other features.
-
Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws
By: TechTarget ComputerWeekly.com
Type: eBook
In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.
-
Top 10 end-user computing stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
IT has been looking at how desktop computing can enable employees to become more productive by using new forms of collaboration and enterprise social media platforms. Here are Computer Weekly's top 10 end-user computing stories of 2019.
-
Unify and reduce your data footprint
By: Panzura
Type: Product Overview
With higher data volumes than ever before, many organizations struggle to extract the optimal value from their data due to its sheer scale. The new Edge gateway from Panzura is designed to link your data centers together in order to unify and reduce your overall data footprint. Read on to learn more.
-
Managing Android devices in the enterprise
By: TechTarget ComputerWeekly.com
Type: eBook
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
-
Computer Weekly 28 May 2019: Technology at heart of Spurs' new stadium
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
-
8 secure file transfer services for the enterprise
By: TechTarget ComputerWeekly.com
Type: eGuide
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
-
Digital Experience Trends 2023: A Data-Driven Trend Report
By: Reply
Type: White Paper
With so much focus on the customer experience, in a digital-first world, it is going to be your organization’s digital experience that makes the difference in your success. Your customers demand an engaging and frictionless experience with no hurdles to clear. To deliver that, you need to know the current trends. Read on to see them here.
-
2024 security report: Predictions from 3 CISOs
By: Checkpoint Software Technologies
Type: Research Content
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
-
Digital secure remote payment: How Apple Pay can change the future of remote payments
By: TechTarget ComputerWeekly.com
Type: Research Content
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
-
7 Examples to Prove the ROI of SMS APIs
By: 8x8
Type: White Paper
SMS is the most direct, immediate, and widely used channel globally. And now with the availability of SMS API by cloud communication providers, businesses can start to get more creative on how they use text messages. Read on to learn about 7 examples of how you can find success with an SMS API integration.
-
Guide to the dangers of third-party threats
By: Ionix
Type: White Paper
Modern applications are overly reliant on third-party services and content. As a result, security compromises resulting from third-party vulnerabilities have seen a marked increase. Download this white paper to unlock an in-depth look at how you can use an attack surface management (ASM) solution to protect your applications.
-
Computer Weekly - 8 September 2020: NHS whistleblowers at risk due to poor IT policies
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our investigation into NHS practices shows how poor IT policies are putting whistleblowers at risk. Our buyer's guide examines the networking implications of the surge in remote working. And we assess how well the public cloud giants responded to the demands of the coronavirus pandemic Read the issue now.
-
AWS Lambda function URLs: The risks & how to address them
By: Contrast Security
Type: White Paper
This white paper covers the risks associated with using function URLs and how your organization should address them. Access it here.
-
Strengthen Your Incident Response with Endace and Cisco
By: Endace
Type: Product Overview
When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.
-
How to Eliminate Any Guesswork in Security Incident Response
By: Endace
Type: Data Sheet
When you’re investigating a security incident, you want to eliminate any guesswork. EndaceVision, a browser-based investigation GUI, can help you do so. Learn all about the product in this data sheet.
-
Are we trusting social networks too much?
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
How PKI Helps to Maintain Trust for 5G
By: Utimaco
Type: White Paper
How can you address the complex requirements of your 5G network while maintaining security? A public key infrastructure (PKI) establishes trust between all of the entities in your network, which can users and/or devices. Read on to learn how you can leverage a PKI to prevent attacks and take control of your 5G network.
-
Cyber Security 2016 and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
The secret to better communication for educators
By: Sangoma Technologies
Type: White Paper
Today’s education professionals need efficient ways to communicate and interact with parents, administrators, students, and coworkers. However, due to school budget restrictions and other challenges, many educators find themselves unsure of how to proceed. Dig into this white paper to learn more.
-
Extracting actionable data from banking malware
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
-
Enhancing network edge security: 12-page e-book
By: Cradlepoint
Type: eBook
Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.