Top 11 cloud security challenges and how to combat them
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023
|
|
|
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 15 Mar 2021 | Published: 19 Feb 2021
|
|
|
Enterprise-Grade Wireless LAN Security
sponsored by Siemens
WHITE PAPER:
This white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
Posted: 14 Nov 2006 | Published: 01 Sep 2005
|
|
|
eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
sponsored by TechTarget Mobile Computing
EBOOK:
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
Posted: 09 Dec 2008 | Published: 09 Dec 2008
|
|
|
Facilitating Enterprise PCI DSS Compliance - Executive Summary
sponsored by Globalscape
WHITE PAPER:
The GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements.
Posted: 16 Apr 2008 | Published: 15 Apr 2008
|
|
|
Leverage Active Directory with Kerberos to Eliminate HTTP Password
sponsored by PistolStar, Inc.
WHITE PAPER:
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
Posted: 17 Apr 2008 | Published: 01 Apr 2008
|
|
|
Get Ready for Master Data Management: Ten Things You Can Do Now
sponsored by Kalido
WHITE PAPER:
This paper explians in detail ten things you can do now to prepare for your master data management initiative.
Posted: 27 Oct 2008 | Published: 27 Oct 2008
|
|
|
Cascading Risk
sponsored by Core Security Technologies
WEBCAST:
This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)
|
|
|
The Case for Application Security: How Real Is the Threat and What Are Your Options
sponsored by Fortify Software
WHITE PAPER:
This white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
Posted: 24 Oct 2007 | Published: 24 Oct 2007
|
|
|
Best Practices for Archiving Lotus Domino Environments
sponsored by Symantec Corporation
WEBCAST:
This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.
Posted: 07 Mar 2008 | Premiered: Mar 19, 2008, 14:00 EDT (18:00 GMT)
|
|