CERT Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

VxWorks Cert Edition
sponsored by Wind River
PRODUCT OVERVIEW: By leveraging VxWorks Cert Edition, you can provide your organization with the assurance that you will have a strong OS foundation to meet the most demanding safety certification standards. Read on to learn about an integrated development suite equipped with the tools you need to enable standardization across your enterprise.
Posted: 26 Aug 2023 | Published: 26 Aug 2023

TOPICS:  .NET
Wind River

A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER: It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

WIND RIVER STUDIO: DEVELOP Safety Artifacts
sponsored by Wind River
LANDING PAGE: Wind River Studio provides certifiable platforms for safety-critical systems, meeting avionics, industrial, automotive, and medical standards. Discover how their cloud-native tools expedite development of real-time operating systems. For faster, secure robotics or infrastructure solutions, explore Wind River Studio.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET
Wind River

Detect and Survive
sponsored by Guidance Software, Inc.
WHITE PAPER: This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

Information Security ANZ Nov 2015
sponsored by TechTarget
EZINE: In this issue we look at the true cost of a data breach to an Australian organisation.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

TechTarget

FITSCO Meets Critical Quality, Timeline Goals for Automated Train Signaling Solution with Wind River
sponsored by Wind River
CASE STUDY: No one likes being stuck in traffic due to a train, but most do not stop to consider the safety and technology requirements that go into something so simple. When one of the largest rail companies in China needed to pass stringent safety requirements for their signaling systems, they turned to one vendor. Read on to find out how their story ended.
Posted: 16 Nov 2023 | Published: 16 Nov 2023

TOPICS:  .NET
Wind River

Threat Landscape ReportSpecial Edition: Conti Group
sponsored by Deep Instinct
RESEARCH CONTENT: As the Conti group continues to menace enterprises, businesses are left scrambling to bolster their defenses against the ransomware group. To better protect your business from Conti’s attacks, unlock a comprehensive overview of the group’s history, campaign flow and more in this report.
Posted: 13 Jul 2023 | Published: 13 Jul 2023

TOPICS:  .NET
Deep Instinct

Certified Success: LSIS Speeds Delivery of Smart Train Control System With Wind River
sponsored by Wind River
CASE STUDY: Read this case study to learn how LSIS, a leading specialist in electric power and automation solutions, partnered with Wind River to develop an unmanned remote control system for trains in Korea.
Posted: 16 Nov 2023 | Published: 16 Nov 2023

TOPICS:  .NET
Wind River

E-Book: Strategic guide to insider threat detection and breach response
sponsored by TechTarget Security
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

TechTarget Security

How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Your Guide to Modern Mobility
sponsored by TechTarget Mobile Computing
EZINE: A mobile center of excellence can bring together all the important people an organization needs to build and implement a mobile strategy. Learn how companies form these groups and what they entail. Also, discover IT certifications available to mobility professionals, options for staffing and app dev platform tools.
Posted: 10 May 2016 | Published: 10 May 2016

TechTarget Mobile Computing

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE: Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

Vxworks 653 Multi-Core Edition
sponsored by Wind River
PRODUCT OVERVIEW: For an introduction to a real-time operating system (RTOS) for developers in the defense industry, download this overview.
Posted: 31 Aug 2023 | Published: 31 Aug 2023

TOPICS:  .NET
Wind River

Managed Threat Detection [log] for Microsoft Sentinel
sponsored by Orange Cyberdefense
PRODUCT OVERVIEW: As your workforce grows more dispersed and your attack surface wider, securing your Microsoft environment becomes more complex. So, how can you address that challenge? This overview advocates for leveraging Managed Threat Detection for Microsoft Sentinel. Keep reading to learn why.
Posted: 12 Jan 2024 | Published: 13 Jan 2024

TOPICS:  .NET
Orange Cyberdefense

SSL Certificate Management: A Practical Guide
sponsored by Symantec Website Security
EGUIDE: This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

VXWorks for Aerospace and Defense
sponsored by Wind River
PRODUCT OVERVIEW: VxWorks® aerospace and defense software saves costs and accelerates certification. Proven in 750+ safety programs and 120+ aircraft, Read how VxWorks streamlines compliance, satisfies real-time operating systems needs, secures systems, simplifies software integration, and inspires developers.
Posted: 02 Dec 2023 | Published: 02 Dec 2023

TOPICS:  .NET
Wind River

From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts
sponsored by HP Inc
EGUIDE: In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.
Posted: 14 Nov 2016 | Published: 02 Nov 2016

HP Inc

Buyer’s Guide for Machine Identity Management
sponsored by Venafi & Intel
RESOURCE: This buyer’s guide provides you with a checklist to help evaluate which solutions provide the most agile management across all your certificate authorities. You’ll learn which capabilities provide the flexibility you need to protect keys and certificates across your organization. Download this buyer’s guide to learn more.
Posted: 07 Dec 2021 | Published: 08 Dec 2021

TOPICS:  .NET
Venafi & Intel

Supersize The Value Of Your Microsoft Security Investments
sponsored by Orange Cyberdefense
PRODUCT OVERVIEW: How can you amplify your Microsoft investments? By leveraging an objective and experienced view of the solutions in your security ecosystem, you can gain a clearer understanding of how to use them effectively and build a more comprehensive cybersecurity strategy. Read on to learn how managed services can help you get there.
Posted: 16 Jan 2024 | Published: 17 Jan 2024

TOPICS:  .NET
Orange Cyberdefense

Computer Weekly – 4 November 2014: Enterprises push for open standards
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about a new push led by Shell and BP to define IT interoperability standards for the digital age. We learn how one company is introducing bitcoin support into its IT systems. And we ask whether the cloud price wars mean lower service levels from suppliers. Read the issue now.
Posted: 31 Oct 2014 | Published: 31 Oct 2014

TechTarget ComputerWeekly.com

CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 08 Feb 2021 | Published: 19 Mar 2020

TechTarget ComputerWeekly.com

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Computer Weekly – 21 July 2015: How the internet of things could save the honeybee
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with bee populations being decimated, we find out how the internet of things could save the honeybee. Amid fears that artificial intelligence could end human innovation, we hear from the experts on AI about the reality. And we examine the challenges of customer service in a multi-channel world. Read the issue now.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

TechTarget ComputerWeekly.com

Web-facing applications: Security assessment tools and strategies
sponsored by TechTarget Security
WHITE PAPER: Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
Posted: 08 Oct 2012 | Published: 08 Oct 2012

TechTarget Security