Proving ownership of IPv6 addresses
sponsored by ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 25 Jun 2019 | Published: 25 Jun 2019
|
|
|
CW Middle East Jan to Mar 2018
sponsored by ComputerWeekly.com
EZINE:
The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
Posted: 04 Jan 2018 | Published: 11 Jan 2018
|
|
|
The real need for distributed denial-of-service protection: How to stop DDoS attacks
sponsored by SearchSecurity.com
EGUIDE:
This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.
Posted: 23 Nov 2011 | Published: 22 Nov 2011
|
|
|
CW Europe – December 2017
sponsored by ComputerWeekly.com
EZINE:
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 07 Dec 2017 | Published: 14 Dec 2017
|
|
|
Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway
sponsored by Cisco Umbrella
EGUIDE:
Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
Posted: 01 Sep 2017 | Published: 29 Aug 2017
|
|
|
GFI WebMonitor 2012
sponsored by GFI Software
TRIAL SOFTWARE:
Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
Posted: 09 Mar 2012 | Premiered: 09 Mar 2012
|
|
|
Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER:
This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014
|
|
|
Messaging and Web Security Best Practices for 2011 and Beyond
sponsored by GFI Software
WHITE PAPER:
This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011
|
|
|
The Business Case for Managed DDos Protection
sponsored by Neustar®
WHITE PAPER:
This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.
Posted: 18 Nov 2011 | Published: 17 Nov 2011
|
|
|
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER:
Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013
|
|
|
|
|