Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER:
This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008
|
|
|
Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021
|
|
|
Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018
|
|
|
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER:
SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007
|
|
|
The Defender’s Advantage
sponsored by Google
EBOOK:
By reading this e-book, you will understand how to activate your cyber defense with an intelligence-led approach. Read on now to learn how you can leverage threat intelligence, detection engineering, and coordinated incident response to maximize your Defender's Advantage and strengthen your cybersecurity posture.
Posted: 17 Jan 2025 | Published: 21 Jan 2025
|
|
|
Trust Emerges as Cybersecurity Issue for 42% of Security Decision-Makers
sponsored by XtelligentMedia Healthcare
EGUIDE:
With cyberattacks on the rise, trust in teams and technology is crucial. However, 42% of security leaders see a trust deficit as their biggest hurdle, a new survey showed. Some trust is also misplaced, with 66% of security leaders trusting employees to prevent cyberattacks more than their own teams. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023
|
|
|
Aerospace And Defense Mercury Systems
sponsored by SWPL
CASE STUDY:
Mercury Systems used Mendix's low-code platform to create a digital thread linking manufacturing systems across the product lifecycle. By centralizing data from various tools, they developed 20 applications to boost transparency, speed delivery, and drive innovation. Learn how their portal provides engineers with comprehensive product views.
Posted: 03 Apr 2025 | Published: 03 Apr 2025
|
|
|
ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT:
This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Saudi Arabia’s NCA OTCC-1:2022 Mandate for Industrial Control Systems
sponsored by Nozomi Networks
WHITE PAPER:
Saudi Arabia's NCA OTCC-1:2022 sets cybersecurity controls for industrial systems. The Nozomi Networks platform supports 11 of 13 subdomains in Cybersecurity Defense through automated asset discovery, network visibility, vulnerability management, and threat detection. Read the White Paper to see how Nozomi Networks aligns with Saudi mandates.
Posted: 12 Apr 2025 | Published: 12 Apr 2025
|
|
|
Aerospace And Defense Pilatus
sponsored by SWPL
CASE STUDY:
Pilatus Aircraft digitalized their manufacturing with Mendix and Teamcenter, reducing paperwork and enhancing transparency. They now have a 3-month average time-to-market for new Mendix-built solutions, improved quality standards, and fully documented workflows. Read the case study to see how Pilatus achieved connected manufacturing excellence.
Posted: 03 Apr 2025 | Published: 03 Apr 2025
|
|
|
Aerospace And Defense Bae Systems
sponsored by SWPL
CASE STUDY:
BAE Systems used Mendix low-code to tackle IT backlogs and avoid shadow IT. They created 15 apps in two years, cutting production time by 66%. A Mendix-first strategy allowed faster, robust development. Read this case study to learn how BAE Systems achieved IT agility with low-code.
Posted: 03 Apr 2025 | Published: 03 Apr 2025
|
|
|
Cloud Infrastructure Wireless Airspace Defense
sponsored by Bastille
PRODUCT OVERVIEW:
Wireless threats can impact cloud infrastructure security, allowing data exfiltration and system disruption. This solution brief outlines how Bastille's comprehensive wireless monitoring and threat detection can defend your cloud infrastructure. Read the full brief to learn more.
Posted: 19 Feb 2025 | Published: 20 Feb 2025
|
|
|
Empower your workforce to be your first line of cyber defense
sponsored by StarHub
WHITE PAPER:
Empower your workforce to be your first line of defense against cyber threats. Learn how StarHub's Cybersecurity Awareness Training Platform can help your organization combat phishing attacks and data breaches. Read the white paper to discover the key features and benefits.
Posted: 20 Feb 2025 | Published: 20 Feb 2025
|
|
|
Industry Insights Generative AI & Cybersecurity
sponsored by NOKIA Intel
ANALYST REPORT:
This Omdia research report examines how telecom organizations are incorporating generative AI into their cybersecurity strategies to improve threat detection, automate tasks, and enhance resilience. Explore the benefits, challenges, and future plans for leveraging this transformative technology by reading the full report.
Posted: 23 Nov 2024 | Published: 02 Oct 2024
|
|
|
KELYN Technologies and The Missile Defense Agency (MDA)
sponsored by Commvault
CASE STUDY:
This case study details KELYN Technologies' implementation of its KMDS solution for the Missile Defense Agency, replacing a cumbersome NetBackup system. Completed in 6 weeks instead of 6-12 months, it freed IT staff and improved data restoration times. Read the full case study to see how critical defense data is protected.
Posted: 10 Apr 2025 | Published: 10 Apr 2025
|
|
|
Deep Learning Delivers Proactive Cyber Defense
sponsored by Deep Instinct
ANALYST REPORT:
Amidst the cybersecurity skills shortage, organizations are hard pressed to find new answers to evolving problems. Deep learning, a subset of machine learning, offers a highly accurate way to identify attack patterns and stop threats before they become attacks, without the need for highly skilled cybersecurity experts. Read on to learn more.
Posted: 22 Feb 2023 | Published: 22 Feb 2023
|
|
|
Defending A Defense Contractor With A Compliant Unified Communications Solution
sponsored by ARG, Inc.
CASE STUDY:
A national, privately held defense contractor had previously leveraged Avaya on-prem PBX, Verizon PRIs and numerous collaboration and messaging tools (Teams, Slack, etc.) As many of these were disjointed, compliance risks arose. View this case study to learn how ARG helped this contractor aggregate tools and eliminate overlap.
Posted: 30 Jul 2021 | Published: 30 Jul 2021
|
All resources sponsored by ARG, Inc.
|
|
Zscaler ThreatLabz 2024 Phishing Report
sponsored by Zscaler
RESEARCH CONTENT:
Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
The Business Case for IT/OT Collaboration in Modernizing Industrial Networks
sponsored by Cisco
WHITE PAPER:
Leaders are accelerating IT/OT collaboration for success, and seeing significant operational and financial benefits of this approach. This business case highlights the key drivers of OT modernization, the specific advantages including standardization, advanced cybersecurity, network automation, and AI readiness.
Posted: 25 Mar 2025 | Published: 25 Mar 2025
|
|
|
Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense
sponsored by ESET
WHITE PAPER:
This white paper explores the role of cyber threat intelligence in proactive defense strategies. It examines challenges, benefits of prevention-first approaches, and how ESET's Threat Intelligence solutions enhance security. Learn to leverage CTI for effective threat mitigation and risk reduction. Read the full white paper for insights.
Posted: 27 Feb 2025 | Published: 27 Feb 2025
|
|
|
Top 3 Risks For DIY Auth In Regulated Industries
sponsored by FusionAuth
WHITE PAPER:
This white paper examines the challenges of managing in-house authentication, particularly for regulated industries. It covers compliance, security, and the advantages of outsourcing. Discover how to select the right vendor and ensure a smooth transition. Read the full paper for insights on securing your organization's digital future.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021
|
|
|
Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by Exabeam
WHITE PAPER:
The MITRE ATT&CK framework offers a standardized knowledge base of adversary tactics and techniques, aiding organizations in crafting threat-informed defenses. This SANS white paper details how to use the ATT&CK framework for cyber threat intelligence, gap identification, and analytics testing, with practical strategies.
Posted: 04 Apr 2025 | Published: 05 Apr 2025
|
|
|
Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by Exabeam
WHITE PAPER:
The MITRE ATT&CK framework offers a standardized knowledge base of adversary tactics and techniques, aiding organizations in crafting threat-informed defenses. This SANS white paper details how to use the ATT&CK framework for cyber threat intelligence, gap identification, and analytics testing, with practical strategies.
Posted: 09 Apr 2025 | Published: 05 Apr 2025
|
|
|
AI Driven SOC Transformation with Cortex XSIAM
sponsored by Palo Alto Networks
WHITE PAPER:
As cyberattacks occur more quickly and more often, how can security operations centers (SOCs) keep up? Tap into this 21-page white paper to discover how 6 organizations transformed their SOC to boost their defenses in the evolving threat landscape.
Posted: 15 May 2024 | Published: 15 May 2024
|
|
|
Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by Exabeam
WHITE PAPER:
The NIS2 Directive strengthens EU cybersecurity with stricter measures and reporting. This white paper details ten compliance steps, including risk assessments, incident response, and multi-factor authentication. Discover how to prepare for NIS2. Read the white paper for full guidance on compliance.
Posted: 05 Apr 2025 | Published: 05 Apr 2025
|
|
|
Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by Exabeam
WHITE PAPER:
The NIS2 Directive strengthens EU cybersecurity with stricter measures and reporting. This white paper details ten compliance steps, including risk assessments, incident response, and multi-factor authentication. Discover how to prepare for NIS2. Read the white paper for full guidance on compliance.
Posted: 09 Apr 2025 | Published: 05 Apr 2025
|
|
|
Detecting Insider Threats
sponsored by Nozomi Networks
EBOOK:
Insider threats in industrial settings pose a great risk, with physical consequences beyond data theft. Negligent employees cause most incidents (56%), while malicious insiders are less common (26%). Effective protection requires real-time monitoring with OT-specific agents. Read this e-book for strategies to mitigate insider threats.
Posted: 12 Apr 2025 | Published: 12 Apr 2025
|
|
|
A CISO’s Guide to the AI Opportunity in Security Operations
sponsored by Exabeam
WHITE PAPER:
AI is transforming cybersecurity, presenting opportunities and threats for CISOs. This guide defines AI technologies impacting security, explores their role in threat detection, and outlines building AI-augmented defenses. Discover proven technologies that strengthen security. Read the white paper to prepare your SOC for an AI-driven future.
Posted: 26 Mar 2025 | Published: 26 Mar 2025
|
|