Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Feb 2020
|
|
|
Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
What’s Your Login Worth? Less Than a Latte
sponsored by CyberArk
WHITE PAPER:
Fact: Attackers can buy stolen credentials on the dark web for less than a cup of coffee. In this insightful piece by Archit Lohokare, General Manager of Workforce Solutions at CyberArk, learn how a bold new approach to identity security can secure your workforce from the first touchpoint to the last mile of the digital journey.
Posted: 02 Dec 2024 | Published: 02 Dec 2024
|
|
|
Threat Trends Report
sponsored by LevelBlue
RESEARCH CONTENT:
The LevelBlue Threat Trends Report is a must-have for security practitioners at organizations of all sizes. In this edition, analysts share key insights into attacker activity observed in the second half of 2024. Download your complimentary copy today for critical insights into current threats.
Posted: 23 Apr 2025 | Published: 23 Apr 2025
|
|
|
The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK:
This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Unlocking Productivity And Security: The Business Case For Modern Enterprise Password Management
sponsored by CyberArk
WHITE PAPER:
Password sprawl poses security risks and productivity loss. This Informa TechTarget paper examines how outdated management fails as workforce identities grow. Discover how you can enhance security and UX with password management solutions that have multichannel architecture, strong encryption, and a path to passwordless.
Posted: 09 May 2025 | Published: 09 May 2025
|
|
|
An Analysis of Attacker Activity through NDR, EDR, and NGFW Data
sponsored by Fortinet, Inc.
RESEARCH CONTENT:
This white paper analyzes over 11 trillion network events to uncover the most common MITRE ATT&CK tactics and techniques used by attackers in 2023. It provides insights on C2, RAT malware, valid account abuse, and more to help security teams detect and respond to threats. Read the full white paper for comprehensive analysis.
Posted: 07 Oct 2024 | Published: 08 Oct 2024
|
|
|
The State Of Cyber Security 2025
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
The State of Cyber Security 2025 report highlights a 58% rise in infostealer attacks, increased ransomware targeting of healthcare, and evolving nation-state cyber tactics. Cloud vulnerabilities and edge devices remain key threats. Read this report to grasp today's threat landscape and apply recommended defense strategies.
Posted: 16 Apr 2025 | Published: 16 Apr 2025
|
|
|
SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE:
If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021
|
|
|
2025 Buyer’s Guide to Load Balancing Solutions
sponsored by Progress Software Corporation MOVEit
BUYER'S GUIDE:
This guide aids IT professionals in identifying business goals, features, and licensing for load balancing solutions. It covers infrastructure, health checks, security, and management for optimal application performance. Read the full Buyer's Guide to make informed decisions on selecting the right load balancing technology for your organization.
Posted: 24 Apr 2025 | Published: 24 Apr 2025
|
All resources sponsored by Progress Software Corporation MOVEit
|
|
Tactical AppSec: A Champions' Field Guide
sponsored by Security Journey
EBOOK:
Whether you're flying solo or running a Champions program, this guide helps you embed security into your culture without slowing down development. Ready to shift left, spot threats early, and become the go-to voice for security on your team?
Posted: 30 Apr 2025 | Published: 30 Apr 2025
|
|
|
The Secure Coding Handbook
sponsored by Veracode
EBOOK:
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023
|
|
|
McAfee Labs Threats Report
sponsored by McAfee
RESEARCH CONTENT:
Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.
Posted: 05 May 2021 | Published: 05 May 2021
|
|
|
AI-Driven Innovation
sponsored by Okta
WHITE PAPER:
The AI revolution demands a new approach to Identity and access management. As organizations race to integrate AI into their products and services, managing digital Identities can get complex. This whitepaper explores how businesses can drive and balance innovation with security. Read on now to unlock key insights.
Posted: 08 Apr 2025 | Published: 08 Apr 2025
|
|
|
Computer Weekly – 28 January 2025: Turbulent times ahead for tech
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the World Economic Forum highlighted growing risks to digital supply chains – we examine the turbulence ahead. Data sovereignty is becoming a growing issue as companies move to the cloud – we look at the regulatory challenges. And we analyse the best practices in automated patch management. Read the issue now.
Posted: 27 Jan 2025 | Published: 28 Jan 2025
|
|
|
Data governance more important now than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
Posted: 08 Feb 2021 | Published: 11 Jun 2019
|
|
|
Secure Coding Report: Injection Vulnerabilities
sponsored by Security Journey
RESEARCH CONTENT:
Application security faces a dilemma as cybercrime rises and developers feel pressure to innovate quickly. This white paper analyzes how short, continuous secure coding training can help mitigate injection vulnerabilities - one of the most common web app flaws. Learn how to get secure coding right and protect your organization.
Posted: 08 Jan 2024 | Published: 16 Jan 2025
|
|
|
Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021
|
|
|
Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 08 Feb 2021 | Published: 21 Oct 2019
|
|
|
A Computer Weekly buyer's guide to NoSQL
sponsored by TechTarget ComputerWeekly.com
EBOOK:
There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.
Posted: 08 Feb 2021 | Published: 28 Jul 2016
|
|
|
Enterprise Browser Buyers Guide
sponsored by Island
BUYER'S GUIDE:
What is an enterprise browser? In essence, it’s optimized for end users but couples security controls to ensure data is properly protected. If you’re new to the concept, this buyers guide has you covered. Download a copy of this 27-page Enterprise Browser Buyers Guide to understand the enterprise browser inside and out.
Posted: 24 Apr 2024 | Published: 24 Apr 2024
|
|
|
M-Trends 2025 Report
sponsored by Google Cloud
RESEARCH CONTENT:
Mandiant's M-Trends 2025 eBook shows attackers exploiting infostealer malware, unsecured data, and cloud migration gaps. Read the full book to understand evolving threat tactics and enhance your organization's security posture.
Posted: 30 Apr 2025 | Published: 30 Apr 2025
|
|
|
Toughening up web and mobile application security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
Posted: 09 Feb 2022 | Published: 09 Feb 2022
|
|
|
Digital Experience platforms intensify customer engagement programmes
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Digital Experience Management platforms are developing and becoming more sophisticated as companies seek to intensify relationships with customers in order to gain competitive advantage against their peers. Improving customer experience will only become evermore important as companies endeavor to navigate an increasingly turbulent economy.
Posted: 08 Aug 2022 | Published: 08 Aug 2022
|
|
|
Computer Weekly – 13 August 2024: Designed to deceive – reviewing the Post Office scandal inquiry
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we review the marathon latest phase of the Post Office scandal inquiry, as ministers, civil servants, executives and lawyers were shamed. We look at IOWN – a candidate for the next generation of networking technology. And we examine best practice in software asset management. Read the issue now.
Posted: 09 Aug 2024 | Published: 13 Aug 2024
|
|
|
Computer Weekly – 18 March 2025: UK under-prepared for catastrophic cyber attack
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, MPs have been told the UK is under-prepared to cope with a catastrophic cyber attack – we find out where the problems lie. Our new buyer's guide assesses the challenges of datacentre capacity planning. And Sir Martin Sorrell talks about the risks and opportunities of AI. Read the issue now.
Posted: 14 Mar 2025 | Published: 18 Mar 2025
|
|
|
Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.
Posted: 25 Jun 2021 | Published: 29 Jun 2021
|
|