Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022
|
|
|
Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Feb 2020
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Object storage: A great fit for large, unstructured data sets
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.
Posted: 08 Feb 2021 | Published: 12 Nov 2018
|
|
|
The difficulties of defending against web tracking
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
Posted: 08 Feb 2021 | Published: 22 May 2018
|
|
|
Data governance more important now than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
Posted: 08 Feb 2021 | Published: 11 Jun 2019
|
|
|
SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE:
If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021
|
|
|
Top 14 Use Cases for an Enterprise Browser
sponsored by CyberArk
WHITE PAPER:
Enterprise browsers are the key to securing organizations in a threat landscape where identities and attacker innovations are on the rise. This whitepaper presents the top 14 use cases security leaders can tap into to bolster their security posture.
Posted: 04 Sep 2024 | Published: 04 Sep 2024
|
|
|
State of Application Security 2024
sponsored by Cloudflare
EBOOK:
Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.
Posted: 13 Sep 2024 | Published: 14 Sep 2024
|
|
|
Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.
Posted: 10 Sep 2021 | Published: 14 Sep 2021
|
|
|
Computer Weekly – 30 July 2024: CrowdStrike blue screen bug serves a stark warning
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we analyse the lessons from the global IT outage caused by the blue screen bug in CrowdStrike security software. We talk to the data chief of Barilla, the €4bn pasta maker, about the benefits of asking, "So what?" And we find out how Finland is taking a lead on quantum computing. Read the issue now.
Posted: 26 Jul 2024 | Published: 30 Jul 2024
|
|
|
Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017
|
|
|
Anatomy Of Identity Based Attacks
sponsored by Okta
WHITE PAPER:
74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
Posted: 12 Apr 2024 | Published: 13 Apr 2024
|
|
|
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by TechTarget Security
WHITE PAPER:
This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008
|
|
|
Why EDR Isn’t Enough to Stop Cyberattacks
sponsored by CyberArk
PRODUCT OVERVIEW:
In this whitepaper you'll learn why conventional EDR tools have gaps for protecting against endpoint protection attacks and how CyberArk Endpoint Privilege Manager fills the gap where EDR solutions fall short. Read the whitepaper and help protect your organization from endpoint security cyberthreats.
Posted: 15 Feb 2023 | Published: 15 Feb 2023
|
|
|
Our Top 5 Vulnerable Open Source Components
sponsored by Sonatype
WHITE PAPER:
Software dependencies can equal open-source vulnerabilities. To empower your developers in leveraging open-source components while mitigating risk, read this white paper. Inside, Sonatype evaluates the top 5 open-source components, their vulnerabilities, and remediation recommendations.
Posted: 14 Mar 2024 | Published: 14 Mar 2024
|
|
|
Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette
sponsored by Cisco
RESEARCH CONTENT:
The 2024 "Cyber Threat Trends Report" by Cisco analyzes the threats crowding the cyber landscape, including information stealers, Trojans and ransomware. It also provides insights on how DNS security can help defend your organization against those growing threats. Read the 18-page report to unlock the full insights.
Posted: 07 Sep 2024 | Published: 12 Sep 2024
|
|
|
CW Benelux August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 08 Feb 2021 | Published: 10 Aug 2017
|
|
|
How Generative AI Is Supporting The Creation Of Lures & Scams
sponsored by Gen Digital
WHITE PAPER:
The capabilities of large language models (LLMs) and generative AI are rapidly evolving. This white paper describes how hackers are utilizing generative AI to fuel cyberattacks, scams, and other social engineering related threats. Read on to learn more.
Posted: 25 Apr 2024 | Published: 25 Apr 2024
|
|
|
Computer Weekly - 8 February 2022: Exploring the metaverse
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
Posted: 04 Feb 2022 | Published: 08 Feb 2022
|
|
|
IT Asset Discovery: From Visibility To Workflow
sponsored by ServiceNow
EBOOK:
Explore in this e-book the kind of data you need to see all your software, hardware, and cloud-based assets – as well as cloud resources that are often overlooked.
Posted: 26 Feb 2024 | Published: 26 Feb 2024
|
|
|
2024 Global Threat Report
sponsored by CrowdStrike
WHITE PAPER:
In this 61-page eBook, discover research into and an analysis of the latest trends and developments in today's threat landscape. Topics covered inside include: an overview of the threat landscape, key cyberattack themes, Crowdstrike's recommendations for moving forward, and more.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Browsers are the Target: Protect Them with Zero Trust Browser Isolation
sponsored by Cradlepoint
WHITE PAPER:
Despite the ease and sophistication that browsers have brought to internet use, they also have become the target choice for cybercriminals looking to hack into your organization and personal data. But why exactly is this? Dig into this white paper to learn more.
Posted: 29 Jan 2024 | Published: 30 Jan 2024
|
|
|
e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
sponsored by Symantec Corporation
BOOK:
The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.
Posted: 09 Jun 2008 | Published: 07 Jun 2008
|
|
|
F5 Distributed Cloud WAAP with Comprehensive API Security
sponsored by F5 Inc.
WHITE PAPER:
APIs, and their increasing presence, represent an expanding attack surface. By using AI and ML, F5 Distributed Cloud WAAP aims to provide effective and scalable application and API security, delivering the following benefits. Download this white paper to learn more.
Posted: 19 Dec 2023 | Published: 20 Dec 2023
|
|
|
Essential Guide for Upgrading Your Network
sponsored by TechTarget Networking
WHITE PAPER:
This SearchNetworking.com E-Book will explore the challenges, best practices and essential technologies for responding to the shortcomings of today's network, as well as future-proofing your network for tomorrow's business challenges.
Posted: 10 Dec 2007 | Published: 10 Dec 2007
|
|
|
5 reasons companies need a modern CDN
sponsored by Fastly
EBOOK:
Discover how a modern CDN can help you deliver fast, secure, and personalized customer experiences. Learn how to scale infrastructure, reduce costs, and empower your developers. Download the e-book to explore the 5 reasons to adopt a modern CDN.
Posted: 10 Sep 2024 | Published: 11 Sep 2024
|
|
|
The Secure Coding Handbook
sponsored by Veracode
EBOOK:
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023
|
|