Zero-Trust Security for Unmanaged Devices
sponsored by Armis
WHITE PAPER:
The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.
Posted: 11 Dec 2020 | Published: 11 Dec 2020
|
|
|
Distance Learning’s Impact on Education IT
sponsored by Absolute Software Corporation
WHITE PAPER:
The spread of COVID-19 has brought about a rapid and dramatic shift towards remote learning models in order to facilitate classroom effectiveness at K-12 schools. This report provides an overview of these challenges, risks and opportunities – gathered from a recent study into the impact of COVID-19 and remote learning on education IT.
Posted: 05 Oct 2020 | Published: 05 Oct 2020
|
|
|
Smarter Data Protection with Machine Learning
sponsored by HelpSystems
WHITE PAPER:
As data grows in its volume and value, organizations should ensure their data privacy capabilities are poised to address today’s cyberthreats and compliance requirements. Read this white paper and discover how machine learning and artificial intelligence can enhance data security programs.
Posted: 08 Dec 2020 | Published: 08 Dec 2020
|
|
|
Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER:
Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021
|
|
|
How the Security Inversion Impacts User and Data Protection
sponsored by Netskope
WHITE PAPER:
Legacy cybersecurity methods are becoming increasingly inefficient against today’s cyberthreats. Modernizing the security model is necessary to ensure innovation and the protection of data and users. Read this white paper to learn more about ensuring effective security in a cloud and mobile-first world.
Posted: 14 Jan 2021 | Published: 14 Jan 2021
|
|
|
Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER:
If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020
|
|
|
Customer Identity and Access Management – The Master Key for Digital Markets
sponsored by IC Consult
WHITE PAPER:
In today’s global market, everything centers on interfaces to customers: Who is the customer? How can their identity be confirmed reliably? Customer identity and access management (CIAM) is helping business answer these questions and more. In this white paper, examine the prerequisites, challenges and opportunities associated with CIAM.
Posted: 12 Jan 2021 | Published: 12 Jan 2021
|
|
|
Security Starts Here AD: Account Lifecycle Management
sponsored by Quest
WHITE PAPER:
Active Directory (AD) security is no laughing matter. Your users are depending on you to grant them the right permissions without delay or compromise, but if your AD suffers a security breach, you and your organization are both in big trouble. Don’t get caught out – read this white paper on Active Directory-centered identity management.
Posted: 23 Oct 2020 | Published: 23 Oct 2020
|
|
|
SASE and the Forces Shaping Digital Transformation Part 2: Organizational Culture & Adversaries and Threats
sponsored by Netskope
WHITE PAPER:
Amid digital transformation, an industry-wide focus on SASE and the effects of the continuing COVID-19 pandemic, there are key forces that security practitioners need to be aware of and operate within. Read this in-depth blog to understand the forces of organizational culture, as well as adversaries and threats, on SASE initiatives.
Posted: 08 Jan 2021 | Published: 12 Nov 2020
|
|
|
Spear Phishing: Top 3 Impersonation Attacks
sponsored by Barracuda
WHITE PAPER:
Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020
|
|
|
|
|