Internet Nanny

Internet Nanny Reports
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Enterprise Risk Management (ERM) and Governance, Risk and Compliance (GRC) Digital tools for oversight in the enterprise
sponsored by ServiceNow
WHITE PAPER: In this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.
Posted: 08 Feb 2021 | Published: 09 Oct 2020

ServiceNow

Attacking And Defending A Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 08 Feb 2021 | Published: 11 Nov 2020

ServiceNow

MPLS, SD-WAN, Internet, and SASE
sponsored by Cato Networks
WHITE PAPER: The WAN is the backbone of the business. It ties together your remote locations, headquarters and data centers into an integrated network. Yet, the role of the WAN has evolved in recent years. In this white paper, learn about the connectivity, optimization and security options that are needed when building a network for the digital business.
Posted: 08 Feb 2021 | Published: 10 Mar 2020

Cato Networks

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

ComputerWeekly.com

CW Buyer's Guide to Emerging technology
sponsored by ComputerWeekly.com
EBOOK: The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

ComputerWeekly.com

Trends in Connected Technologies for First Responders
sponsored by Cradlepoint
WHITE PAPER: In this white paper, examine the role connected technologies play in the effectiveness and safety of first responders and explore considerations for evaluating mobile network solutions that enable it all to work securely and reliably.
Posted: 08 Feb 2021 | Published: 28 May 2020

Cradlepoint

Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.
Posted: 15 Mar 2021 | Published: 31 Jul 2020

Kaspersky

Getting the best out of robotic process automation
sponsored by ComputerWeekly.com
EGUIDE: IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Surviving Beyond the New Normal: It's more than securing your remote workers
sponsored by Okta
WEBCAST: In today’s organizations, directory structures need to be able to handle quick moves to new cloud applications and other systems. This means you need top-of-the-line identity management. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD and how Okta’s modern identity platform may be able to help.
Posted: 08 Feb 2021 | Premiered: Jan 14, 2021

Okta