IT Management  >   Systems Operations  >   Security  >  

Infosecurity

RSS Feed   
Infosecurity Reports
 
Computer Weekly – Digital giving – transforming Save the Children with technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.
Posted: 16 Sep 2016 | Published: 20 Sep 2016

ComputerWeekly.com

Tips on Managing the Deluge of Information Security Threat Reports
sponsored by SearchSecurity.com
EGUIDE: Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

SearchSecurity.com

Computer Weekly – 19 April 2016: The hunters who prey on cyber criminals
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now.
Posted: 18 Apr 2016 | Published: 19 Apr 2016

ComputerWeekly.com

LogRhythm '2018 Cybersecurity Perceptions and Practices Benchmark Survey'
sponsored by LogRhythm, Inc.
ANALYST REPORT: Find out why security teams need to be working more intentionally to take time to understand the full scope of an incident and determine how to best neutralize it.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

LogRhythm, Inc.

Computer Weekly – 3 May 2016: How high-speed rail is accelerating innovation
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how HS2, the UK's planned high-speed railway, is developing its IT from scratch and having to predict the future. We hear from DevOps experts who try to bust some of the myths around continuous software delivery. And our latest buyer's guide analyses graph databases. Read the issue now.
Posted: 29 Apr 2016 | Published: 03 May 2016

ComputerWeekly.com

The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hewlett Packard Enterprise

Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by SearchSecurity.com
EZINE: Today's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
Posted: 16 Nov 2016 | Published: 11 Nov 2016

SearchSecurity.com

CIO Decisions E-zine: May 2014
sponsored by SearchCIO.com
EZINE: Innovations of the new mobility age, including the connected car, mean that CIOs need to reframe their mobile strategy with a customer-focused slant.
Posted: 05 May 2014 | Published: 07 May 2014

SearchCIO.com

Computer Weekly – 2 July 2013: Business value from the internet of things
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from manufacturing giant GE about its plan for gaining business value from the "internet of things", analysing huge amounts of machine data in an industrial internet. Our latest buyer's guide looks at HR management systems. And we look at ways to improve the detection of data breaches. Read the issue now.
Posted: 01 Jul 2013 | Published: 02 Jul 2013

ComputerWeekly.com

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement