IT Agents  >   Standards Organizations  >   Internet Industry Standards Organizations  >  

American Registry of Internet Numbers

RSS Feed   
American Registry of Internet Numbers White Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Understanding the Economics of In-cloud Data Protection: Designed for Today with Tomorrow in Mind
sponsored by DELL, INC. AND INTEL®
WHITE PAPER: By using cloud-based data protection, organizations can provide enterprise-level protection at a reasonable cost and maximize their cloud resources. Read this ESG white paper to see the results of an annual IT spending intentions survey which outlines 3 major benefits of incorporating in-cloud data protection into your strategy for cloud workloads.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

DELL, INC. AND INTEL®

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Prepare Your Network for the Future: Embrace IPv6
sponsored by Hewlett Packard Enterprise
EGUIDE: This E-Guide from SearchEnterpriseWAN.com explores the importance of IPv6 and why it should be on every enterprise's short-term to-do list. View now to uncover how this influential protocol will shape your enterprise now and in the future.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

IPv6 Timeline: The Road to a New Protocol
sponsored by Hewlett Packard Enterprise
EGUIDE: This IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

Maturing Your DLP Strategy for Today’s Threats
sponsored by SearchSecurity.com
EGUIDE: Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

Information Security ASEAN July 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014

SearchSecurity.com

UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010
sponsored by ComputerWeekly.com
WHITE PAPER: In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010.
Posted: 25 Oct 2011 | Published: 02 Jun 2010

ComputerWeekly.com

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

Best Practices For Container Security
sponsored by VMware Tanzu
ANALYST REPORT: Traditional security tools aren’t cutting it in the world of containers. Luckily, this Forrester report identifies the security strategies and alternatives that do work in a container environment. Get started now—explore the best practices for container security here.
Posted: 03 Feb 2021 | Published: 03 Feb 2021

VMware Tanzu

Conflicker Working Group - Lessons learned from Conflicker
sponsored by ComputerWeekly.com
WHITE PAPER: In November 2008, Conficker A, the first of five variants of the malware, rapidly began infecting computers which had failed to install a Microsoft patch released just weeks earlier. In late December 2008, Conficker B added new mechanisms for distribution including USB storage devices.
Posted: 24 Oct 2011 | Published: 31 Jan 2011

ComputerWeekly.com

CW+: Online in the afterlife
sponsored by ComputerWeekly.com
WHITE PAPER: There is no escaping technology – even in death. Technology is woven into now almost every part of ourlives and as a consequence is something we need to consider when preparing a will in the event of death.
Posted: 21 Oct 2011 | Published: 06 Aug 2010

ComputerWeekly.com

Observations from the Front Lines of Threat Hunting
sponsored by CrowdStrike
WHITE PAPER: This report provides a summary of OverWatch's findings from intrusion hunting during the first half of 2018. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified. Read on to learn more.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CrowdStrike

CW+ Quocirca report: Reaping the benefits of IP geolocation
sponsored by ComputerWeekly.com
WHITE PAPER: As more and more human activity moves online, it is easy to think that geography no longer matters—surely the internet is without borders? Whilst in some cases this is true, more often than not online activity spills over into the real world.
Posted: 21 Oct 2011 | Published: 29 Sep 2010

ComputerWeekly.com

A Buyer’s Guide to Enterprise Kubernetes Management Platforms
sponsored by SUSE
WHITE PAPER: Basic Kubernetes installations are plagued by a lack of central visibility, inconsistent security practices, and complex management processes. Access the Buyer’s Guide to Enterprise Kubernetes Management Platforms here to learn which platforms best overcome these challenges.
Posted: 09 Nov 2021 | Published: 09 Nov 2021

TOPICS:  .NET
SUSE

Millennials & E-Commerce
sponsored by CrownPeak
EBOOK: This e-book looks at Millennials, and what organizations can do to market more effectively to them. Specifically, how today’s technology can help solve the challenges of too many channels, too much content, and too little time. Download now to learn more.
Posted: 04 Aug 2021 | Published: 04 Aug 2021

TOPICS:  .NET
CrownPeak

Nowhere To Hide: 2020 Threat Hunting Report
sponsored by CrowdStrike
RESEARCH CONTENT: As threat hunting grows in popularity – and as cyberthreats grow stronger – security pros turn to the hunters for expertise on intrusion tactics and techniques. Examine CrowdStrike’s 2020 Threat Hunting Report to learn key trends and insights into the threat landscape that are shaping threat management programs for 2021.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Cybersecurity
CrowdStrike

February Essentials Guide on Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.
Posted: 07 Feb 2012 | Published: 06 Feb 2012

SearchSecurity.com

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

ISM Essentials Guide – Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

SearchSecurity.com

Fighting Cybercrime in the 21st Century
sponsored by SearchSecurity.com
EBOOK: Strengthen your security with these expert insights into fighting advanced crimeware.
Posted: 20 May 2015 | Published: 20 May 2015

SearchSecurity.com

BlackBerry "Fully" Detects and Protects in SE Labs Test
sponsored by BlackBerry
WHITE PAPER: SE Labs tested BlackBerry Protect and Optics in this Breach Response test. They pitted it against a range of hacking attacks designed to compromise systems and penetrate target networks. These are the same techniques criminals and other attackers use to breach systems and networks in the real world. Check out the report to learn how BlackBerry did.
Posted: 19 Aug 2021 | Published: 19 Aug 2021

TOPICS:  .NET
BlackBerry

Ransomware’s New Trend: Exfiltration and Extortion
sponsored by Palo Alto Networks
WHITE PAPER: The primary concern of ransomware was once recovering data and restoring critical systems, but now today’s victims have 3 significant concerns to contend with in this threat type. Download this white paper for a comprehensive look at today’s data exfiltration and extortion threats, best practices for defense and more.
Posted: 13 Oct 2021 | Published: 13 Oct 2021

TOPICS:  .NET
Palo Alto Networks

Why you need convergence
sponsored by ComputerWeekly.com
EGUIDE: You need convergence today more ever.  Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

ComputerWeekly.com

Converged infrastructure fundamentals
sponsored by ComputerWeekly.com
EGUIDE: Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

ComputerWeekly.com

Converged infrastructure fundamentals
sponsored by ComputerWeekly.com
EGUIDE: Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences