Active Security Solutions

Active Security Solutions Reports
Malwarebytes Integration with Connect Wise Manage
sponsored by Malwarebytes
DATA SHEET: Open up this data sheet to take a look at one of Malwarebytes’ newest PSA tools – ConnectWise Manage – and uncover key capabilities, integration benefits, features, and more.
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  Security
Malwarebytes

TOP 50 Security Threats
sponsored by Splunk
EBOOK: Download this e-book for the top 50 security threats from A-Z. All 106 pages will tell you what you need to know about each threat, how the attack happens, and where it comes from.
Posted: 22 Nov 2021 | Published: 06 Apr 2021

TOPICS:  Security
Splunk

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 18 Nov 2021 | Published: 30 Jun 2020

Proofpoint

Password Security Guidelines
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019

TechTarget

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

Explore a hybrid cloud migration strategy
sponsored by Techtarget
RESOURCE: Check out this E-Guide on hybrid cloud adoption to learn benefits and advantages of hybrid cloud, how to migrate effectively, how to simplify your migration strategy, and much more.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Techtarget

Security Think Tank Christmas Special - The most important lessons of 2021
sponsored by ComputerWeekly.com
EBOOK: In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
Posted: 11 Jan 2022 | Published: 10 Jan 2022

ComputerWeekly.com

Everything You Need to Know About the Log4j Vulnerability
sponsored by TechTarget
EGUIDE: Here, dig into the origins of the Log4J vulnerability, the severity, and what needs to change to ensure enterprise systems aren't at risk in the future.
Posted: 17 Dec 2021 | Published: 17 Dec 2021

TechTarget

Impacts of Cyberattacks on IoT Devices
sponsored by Palo Alto Networks
WHITE PAPER: Attack surfaces, threat vectors and vulnerabilities are 3 widely researched topics when it comes to the internet of things (IoT). However, there isn't nearly enough research on the impact successful cyberattacks have on IoT devices. Unit 42, the global threat intelligence team at Palo Alto Networks, took a closer look at this impact.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

TOPICS:  Security
Palo Alto Networks

CW Benelux - August-October 2021: Netherlands sees increase in the number of women opting for an ICT career
sponsored by ComputerWeekly.com
EZINE: The IT skills gap in the Netherlands could be about to narrow as more women take up jobs in the sector. Figures from last year revealed that the number of female ICT professionals grew by 6.5%, while the number of male ICT professionals increased by only 1.7%. Read more about it in this issue.
Posted: 29 Jul 2021 | Published: 12 Aug 2021

ComputerWeekly.com