IoT & the Enterprise: Exploring Opportunities and Challenges in Asia
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.
Posted: 26 Jun 2017 | Published: 26 Jun 2017
|
|
|
Focus ASEAN: Security & Digital Transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 10 Apr 2017 | Published: 11 Apr 2017
|
|
|
Computer Weekly – 11 October 2016: Leadership bonus – analysing our UK salary survey
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.
Posted: 07 Oct 2016 | Published: 11 Oct 2016
|
|
|
How Can You Avoid a Web Security Breach? It's All in the Preparation
sponsored by TechTarget Security
EGUIDE:
In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
Posted: 14 Nov 2013 | Published: 14 Nov 2013
|
|
|
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by TechTarget Security
EGUIDE:
Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
Posted: 17 Oct 2013 | Published: 17 Oct 2013
|
|
|
DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE:
In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016
|
|
|
How Healthcare Organizations are Tackling IoT Device Management
sponsored by Cisco Umbrella
EGUIDE:
Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
Posted: 16 Sep 2016 | Published: 14 Sep 2016
|
|
|
How to Handle the IoT from the Data Center to Security
sponsored by Xively by LogMeIn
EGUIDE:
In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.
Posted: 10 Aug 2016 | Published: 08 Aug 2016
|
|
|
Save Your Future Self With Security Now
sponsored by TechTarget Software Quality
EBOOK:
Secure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.
Posted: 26 Apr 2016 | Published: 25 Apr 2016
|
|
|
Cybersecurity Risks Masked by Controversial Vulnerability Counts
sponsored by Symantec Website Security
EGUIDE:
In this expert e-guide, learn why experts are saying vulnerability reports aren't as dependable as you think. Discover why your organization should focus on managing risk exposure rather than rely on vulnerability counts.
Posted: 16 Feb 2016 | Published: 08 Feb 2016
|
|
|
Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016
|
|
|
Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER:
Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012
|
|
|
What to Look for in Web Application Firewall Products
sponsored by TechTarget Security
EBOOK:
In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014
|
|
|
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER:
Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014
|
|
|
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER:
Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013
|
|
|
Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER:
Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013
|
|
|
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER:
Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013
|
|
|
Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER:
Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013
|
|
|
Banca Intesa Counters Threats with HP ArcSight
sponsored by Hewlett Packard Enterprise
CASE STUDY:
Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
Posted: 30 May 2014 | Published: 29 Mar 2013
|
|
|
Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER:
This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014
|
|
|
Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:
This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
The Tangled Web of Data Privacy Issues
sponsored by Thawte Inc.
EGUIDE:
In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013
|
|
|
SSL Certificate Management: Avoiding Common Mistakes
sponsored by Symantec Corporation
EGUIDE:
This expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.
Posted: 15 Oct 2013 | Published: 11 Oct 2013
|
|
|
Website Security Threat Report, Part Two
sponsored by Symantec Corporation
WHITE PAPER:
This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
Posted: 14 Oct 2013 | Published: 11 Oct 2013
|
|
|
Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER:
This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012
|
|