IT Security Spending Reports

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

SME security - a business imperative
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 08 Feb 2021 | Published: 07 Aug 2017

TechTarget ComputerWeekly.com

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 08 Feb 2021 | Published: 16 Aug 2019

TechTarget ComputerWeekly.com

The rise of the MSSP
sponsored by MicroScope
EGUIDE: In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

MicroScope

Focus: Cyber security in the Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 08 Feb 2021 | Published: 31 Jul 2017

TechTarget ComputerWeekly.com

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

How to Start Building an Enterprise Application Security Program
sponsored by tCell
EGUIDE: In this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.
Posted: 20 Mar 2017 | Published: 16 Mar 2017

tCell

What to Look for in Web Application Firewall Products
sponsored by TechTarget Security
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

TechTarget Security

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
Posted: 09 Jan 2014 | Published: 20 Oct 2011

SafeNet Asia Ltd