CW Benelux November 2017
sponsored by ComputerWeekly.com
EZINE:
The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
Posted: 03 Nov 2017 | Published: 09 Nov 2017
|
|
|
Rethinking the Cyber Security of Consumer Internet of Things
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:
The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions.
Posted: 18 Apr 2019 | Published: 18 Apr 2019
|
|
|
Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 14 Oct 2019 | Published: 15 Oct 2019
|
|
|
CW Middle East Jan to Mar 2018
sponsored by ComputerWeekly.com
EZINE:
The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
Posted: 04 Jan 2018 | Published: 11 Jan 2018
|
|
|
Managing Web Security in an increasingly Challenging Threat Landscape
sponsored by SearchSecurity.com
WHITE PAPER:
In this expert guide, discover how new trends such as mobility, social networking, and cloud computing may be putting your organization at risk, and learn essential strategies for securing your extended enterprise from Web-based threats – read on to learn more.
Posted: 19 Dec 2012 | Published: 19 Dec 2012
|
|
|
Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER:
Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012
|
|
|
Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by ComputerWeekly.com
EGUIDE:
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020
|
|
|
Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by SearchSecurity.com
WHITE PAPER:
This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
Save Your Future Self With Security Now
sponsored by SearchSoftwareQuality.com
EBOOK:
Secure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.
Posted: 26 Apr 2016 | Published: 25 Apr 2016
|
|
|
Next Generation Firewalls: Assessing the Business/Technology Issue
sponsored by Dell SonicWALL
EGUIDE:
In the first of SearchSecurity.com's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.
Posted: 19 Nov 2012 | Published: 14 Nov 2012
|
|
|
|
|