IT Agents  >   Research Institutes and Consortia  >   Software Engineering Institute  >  

CERT

RSS Feed   
CERT Reports
 
Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by SearchCRM
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchCRM

Infographic: Who needs to be on your digital transformation team?
sponsored by ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Why Cloud Certs?
sponsored by A Cloud Guru
WHITE PAPER: Cloud certifications can add immense value to your own skillset, your team’s performance, and your business’ success. In this E-Book, explore the basics of cloud certifications. Learn about the business value of getting your team cloud certified. Download the guide here.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

A Cloud Guru

A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER: It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

Detect and Survive
sponsored by Guidance Software, Inc.
WHITE PAPER: This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

Information Security ANZ Nov 2015
sponsored by TechTarget ANZ
EZINE: In this issue we look at the true cost of a data breach to an Australian organisation.
Posted: 09 Nov 2015 | Published: 09 Nov 2015


How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Your Guide to Modern Mobility
sponsored by SearchMobileComputing
EZINE: A mobile center of excellence can bring together all the important people an organization needs to build and implement a mobile strategy. Learn how companies form these groups and what they entail. Also, discover IT certifications available to mobility professionals, options for staffing and app dev platform tools.
Posted: 10 May 2016 | Published: 10 May 2016

SearchMobileComputing

E-Book: Strategic guide to insider threat detection and breach response
sponsored by SearchSecurity.com
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SearchSecurity.com

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE: Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Automated Indicator Sharing (AIS)
sponsored by Analyst1
DATA SHEET: Automated Indicator Sharing (AIS) is part of a CISA effort to create a cybersecurity ecosystem where public and private sectors exchange information about cyberthreats. Read this data sheet to learn more about AIS, including how to participate.
Posted: 01 Jun 2021 | Published: 01 Jun 2021

TOPICS:  Cybersecurity
Analyst1

Why It’s Time for a Next-Gen Approach to BYOD Security, Privacy, and Productivity
sponsored by BlackBerry
DATA SHEET: As more remote employees use their own desktops, laptops and tablets, BYOD is gaining momentum. A next-generation approach to security can maximize user productivity and satisfaction, while cutting costs and allowing for better business continuity. Read the business brief to learn more.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Security
BlackBerry

What is IoMT Security?
sponsored by Palo Alto Networks
WHITE PAPER: The Internet of Things (IoT) looks drastically different depending on industry vertical. This white paper explores the IoT subclassification known as the Internet of Medical Things (IoMT), which encompasses any device connected to a healthcare provider’s network. Read on to learn about IoMT adoption and how to secure IoMT devices.
Posted: 24 May 2021 | Published: 24 May 2021

TOPICS:  Cybersecurity
Palo Alto Networks

SSL Certificate Management: A Practical Guide
sponsored by Symantec Website Security
EGUIDE: This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Ot/Iot Security Report
sponsored by Nozomi Networks
RESEARCH CONTENT: In this OT/IoT Security Report from Nozomi Networks, take a closer look at the current cyberthreat landscape, including an overview of 18 notable threat types, the 7 most common vulnerability areas, strategic recommendations and more – read on to get started.
Posted: 11 May 2021 | Published: 11 May 2021

TOPICS:  Cybersecurity
Nozomi Networks

CockroachDB The Definitive Guide
sponsored by Cockroach Industries
EBOOK: Access this comprehensive O’Reilly Definitive Guide to CockroachDB to understand how this database was designed to meet key goals, including scalable clusters that seamlessly complement workloads, PostgreSQL application compatibility, and high availability and failover for high performance apps.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

Cockroach Industries

The Case for Cloud Learning
sponsored by A Cloud Guru
CASE STUDY: Despite exploding investment in the cloud, only 35% of IT executives report fully achieving expected cloud benefits. So, what exactly separates the cloud success stories from the failed migrations? Find the answer in 3 cloud case studies, which follow Thomson Reuters, Miami Dade College, and CloudCheckr on their journeys to cloud success.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

A Cloud Guru

1Identity in the Era of Remote WorkThe Hidden Costs of Microsoft CA
sponsored by GlobalSign
EBOOK: Last summer, 62% of Americans were working from home – even before the pandemic, more than half (54%) would have left their current role for a remote one. Microsoft’s Certification Authority (CA) is a popular choice for meeting the needs of a growing remote workforce – but is it the best choice? Read this e-book to find out.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Cybersecurity
GlobalSign

On Account of Cloud Security: ABN-AMRO Case Study
sponsored by HashiCorp
CASE STUDY: As banking in the cloud continues to gain steam, cloud security is now a business-critical endeavor. Click here to learn how a leading financial institution uses HashiCorp Vault to automate secrets management across AWS and Azure—and deliver huge gains for its growing product portfolio.
Posted: 20 Jul 2021 | Published: 20 Jul 2021

TOPICS:  .NET
HashiCorp

Recovering from Ransomware
sponsored by Rubrik
WHITE PAPER: To see this solution in action and to learn how to simplify storage and data management across your company’s storage systems, , access this solution overview.
Posted: 06 May 2020 | Published: 06 May 2020

Rubrik

From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts
sponsored by HP Inc
EGUIDE: In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.
Posted: 14 Nov 2016 | Published: 02 Nov 2016

HP Inc

AWS Marketplace Buyer and Seller FAQs
sponsored by AWS
EGUIDE: In this e-guide, our experts answer 11 of the most frequently asked questions about the AWS Marketplace and shed some light on the expansiveness of the online store. Download your copy here for the answers, and to read an article included that will update you on the continued consolidation of cloud advisory companies.
Posted: 14 Jan 2019 | Published: 10 Jan 2019

AWS

Three key trends impacting K-12 IT and security
sponsored by Absolute Software Corporation
WHITE PAPER: Three key trends impacting K-12 IT and security are 1-to-1 acceleration leaves a logistical nightmare in its wake, the rise of digital learning introduces demands and risks & complexity takes security from afterthought to imperative. Learn how Absolute can help you navigate the threat landscape on the road ahead.
Posted: 25 Aug 2021 | Published: 25 Aug 2021

TOPICS:  .NET
Absolute Software Corporation

Examining ICS/OT Exploits: Findings From More Than a Decade of Data
sponsored by Dragos
WHITE PAPER: Public exploits affect every level of an industrial environment, providing adversaries pre-packaged tools capable of infiltrating and spreading through an ICS/OT network.Open this white paper to learn how to enable operators to remediate ICS/OT vulnerabilities more effectively.
Posted: 09 Sep 2021 | Published: 09 Sep 2021

TOPICS:  .NET
Dragos

Computer Weekly – 4 November 2014: Enterprises push for open standards
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about a new push led by Shell and BP to define IT interoperability standards for the digital age. We learn how one company is introducing bitcoin support into its IT systems. And we ask whether the cloud price wars mean lower service levels from suppliers. Read the issue now.
Posted: 31 Oct 2014 | Published: 31 Oct 2014

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences