Enterprise Security Spending Reports

Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 14 Jul 2020 | Published: 15 Jul 2020

TechTarget ComputerWeekly.com

Infographic: 6 emerging trends in security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

TechTarget ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

How To Limit Privileged Accounts And Boost Security
sponsored by Devolutions
EGUIDE: Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
Posted: 20 Mar 2017 | Published: 15 Mar 2017

Devolutions

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

What to Look for in Web Application Firewall Products
sponsored by TechTarget Security
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

TechTarget Security

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure