Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE:
In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012
|
|
|
Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER:
This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012
|
|
|
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER:
Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011
|
|
|
Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER:
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008
|
|
|
Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT:
This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013
|
|
|
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER:
This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012
|
|
|
The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT:
This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012
|
|
|
Zero Trust with cert-manager, Istio and Kubernetes
sponsored by Venafi
WHITE PAPER:
While there are many benefits to cloud-native, their complexity means traditional security measures are no longer sufficient. This white paper addresses the primary cloud-native factors organizations must consider when adopting Istio, including how to align with modern Zero Trust networking principles. Read on to learn more.
Posted: 23 Nov 2022 | Published: 24 Nov 2022
|
|
|
A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER:
It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011
|
|
|
Cloud Native Certificate Management
sponsored by Venafi
EBOOK:
AS applications continue to rely on container-based technology, it is important that the proper security accommodations are brought into the picture. This e-book presents an overview of Venafi’s cert-manager, exploring the different ways in which their offering can save money, fuel DevSecOps, and improve security. Read now to learn more.
Posted: 18 Nov 2022 | Published: 18 Nov 2022
|
|
|
OT/IoT Security Report
sponsored by Nozomi Networks
RESOURCE:
To help security teams and researchers of OT/IoT environments, this report focuses on three main areas: trends in attacks, vulnerability research, and best practices in remediation efforts and technology. Read on to learn more.
Posted: 14 Apr 2022 | Published: 15 Apr 2022
|
|
|
Trends and Countermeasures for Critical Infrastructure Attacks
sponsored by Nozomi Networks
RESOURCE:
To help security teams and researchers of OT/IoT environments, this report focuses on three main areas: trends in attacks, vulnerability research, and best practices in remediation efforts and technology. Read on to learn more.
Posted: 14 Apr 2022 | Published: 15 Apr 2022
|
|
|
How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE:
According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017
|
|
|
Detect and Survive
sponsored by Guidance Software, Inc.
WHITE PAPER:
This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.
Posted: 16 Apr 2010 | Published: 15 Apr 2010
|
|
|
Information Security ANZ Nov 2015
sponsored by TechTarget
EZINE:
In this issue we look at the true cost of a data breach to an Australian organisation.
Posted: 09 Nov 2015 | Published: 09 Nov 2015
|
|
|
Certificate Misconfiguration is the #1 Kubernetes Security Threat
sponsored by Venafi
WHITE PAPER:
Cloud native Kubernetes and OpenShift have become the standard for modern cloud-based application development. This paper looks at the security concerns surrounding misconfiguration of digital certificates that protect application workloads in cloud-native production environments. Read on to learn more.
Posted: 22 Nov 2022 | Published: 22 Nov 2022
|
|
|
PKI And Certificate Management: 7 Reasons Why It Is Challenging
sponsored by AppViewX
WHITE PAPER:
In spite of this rise in cybercrime damages, the cost of producing an attack is now lower than ever. This white paper looks at how PKI and certificate lifecycle management (CLM) can help organizations overcome the growing threat of cybercrime and presents 7 key obstacles as well as methods for overcoming them. Read on to learn more.
Posted: 17 Feb 2023 | Published: 17 Feb 2023
|
|
|
The 2023 Ciso’S Guide To Certificate Lifecycle Management (CLM)
sponsored by AppViewX
WHITE PAPER:
Digital certificates serve as proof of a machine’s authenticity on a network and help establish and extend trust during communication. This white paper looks at how managing certificates has become a crucial component of cybersecurity and analyzes why CISO’s need to reevaluate their certificate lifecycle management (CLM). Read on to learn more.
Posted: 16 Feb 2023 | Published: 16 Feb 2023
|
|
|
E-Book: Strategic guide to insider threat detection and breach response
sponsored by TechTarget Security
EGUIDE:
Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011
|
|
|
How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER:
Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010
|
|
|
Your Guide to Modern Mobility
sponsored by TechTarget Mobile Computing
EZINE:
A mobile center of excellence can bring together all the important people an organization needs to build and implement a mobile strategy. Learn how companies form these groups and what they entail. Also, discover IT certifications available to mobility professionals, options for staffing and app dev platform tools.
Posted: 10 May 2016 | Published: 10 May 2016
|
|
|
E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE:
Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010
|
|
|
What is IoMT Security?
sponsored by Palo Alto Networks
WHITE PAPER:
The Internet of Things (IoT) looks drastically different depending on industry vertical. This white paper explores the IoT subclassification known as the Internet of Medical Things (IoMT), which encompasses any device connected to a healthcare provider’s network. Read on to learn about IoMT adoption and how to secure IoMT devices.
Posted: 24 May 2021 | Published: 24 May 2021
|
|
|
Dynamic Data Security
sponsored by Xage
DATA SHEET:
To help you achieve modern data success, this white paper explores how Xage Security’s Dynamic Data Security enables you to cooperate across different data platforms while ensuring authenticity, integrity and privacy. Access the white paper here to learn more about Dynamic Data Security.
Posted: 28 Feb 2023 | Published: 28 Feb 2023
|
|
|
A Comprehensive How-To Guide To Certificate Lifecycle Management (CLM)
sponsored by AppViewX
WHITE PAPER:
Digital certificates are now being thought of as the most capable security solution for fighting modern, sophisticated threats. This whitepaper provides a comprehensive look at certificate lifecycle management (CLM,) discussing some of the CLM best practices to help you make the most of digital certificates. Read on to learn more.
Posted: 06 Feb 2023 | Published: 07 Feb 2023
|
|
|
SSL Certificate Management: A Practical Guide
sponsored by Symantec Website Security
EGUIDE:
This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
Posted: 11 Feb 2016 | Published: 08 Feb 2016
|
|
|
From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts
sponsored by HP Inc
EGUIDE:
In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.
Posted: 14 Nov 2016 | Published: 02 Nov 2016
|
|
|
Buyer’s Guide for Machine Identity Management
sponsored by Venafi & Intel
RESOURCE:
This buyer’s guide provides you with a checklist to help evaluate which solutions provide the most agile management across all your certificate authorities. You’ll learn which capabilities provide the flexibility you need to protect keys and certificates across your organization. Download this buyer’s guide to learn more.
Posted: 07 Dec 2021 | Published: 08 Dec 2021
|
|
|
Remediate Threats With Intelligence
sponsored by Kaspersky
DATA SHEET:
The number of security alerts analyzed each day in most cases exceeds the existing capacity of security teams. You need accurate and relevant threat intelligence prevent attacks. This data sheet discusses Kaspersky’s partnership with Microsoft Sentinel, which aims to help users extend their cyberthreat detection capabilities. Read on to learn more.
Posted: 28 Sep 2022 | Published: 28 Sep 2022
|
|
|
Kaspersky Threat Data Feeds and Microsoft Sentinel integration
sponsored by Kaspersky
PRODUCT OVERVIEW:
The modern threat landscape is so diverse and widespread that it can be difficult to identify which threats are relevant to an organization’s security posture. Kaspersky has partnered with Microsoft Sentinel and provides increased threat data in order to improve its security capabilities. Continue on to learn more.
Posted: 06 Oct 2022 | Published: 06 Oct 2022
|
|
|
Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE:
This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012
|
|
|
OT/IoT Security Report
sponsored by Nozomi Networks
ANALYST REPORT:
Cyberattacks are more commonly arising from state-sanctioned cyberterrorism campaigns rather than independent hackers, resulting in more nuanced tactics and higher attack frequencies. This Nozomi report looks at the state of the OT and IoT threat landscape, tracking its evolution in recent months, and providing key insights. Read on to learn more.
Posted: 22 Nov 2022 | Published: 22 Nov 2022
|
|