The development of wired and wireless LANs in a hybrid work model
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).
Posted: 06 Jul 2022 | Published: 06 Jul 2022
|
|
|
5g And The Journey To The Edge
sponsored by AT&T Cybersecurity
ANALYST REPORT:
With the many new ways to take advantage of low-latency, high-speed and reliability 5G is set to offer, how are organizations preparing cybersecurity practices, policies and procedures? The AT&T Cybersecurity Insights Report: 5G and the Journey to the Edge examines global cybersecurity data and the future of computing.
Posted: 07 Apr 2021 | Published: 07 Apr 2021
|
|
|
Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER:
Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 08 Feb 2021 | Published: 30 Nov 2019
|
|
|
13 email threat types to know about right now
sponsored by Barracuda
RESOURCE:
As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 08 Feb 2021 | Published: 01 May 2020
|
|
|
Protecting Business and Remote Workers from Covid-19 Email Threats
sponsored by Barracuda
VIDEO:
The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 08 Feb 2021 | Premiered: 21 Apr 2020
|
|
|
Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 11 May 2018 | Published: 11 May 2018
|
|
|
How Can You Avoid a Web Security Breach? It's All in the Preparation
sponsored by TechTarget Security
EGUIDE:
In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
Posted: 14 Nov 2013 | Published: 14 Nov 2013
|
|
|
What secure email gateways can do for your enterprise
sponsored by TechTarget Security
EBOOK:
It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020
|
|
|
Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK:
While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019
|
|
|
Malware Hitching a Ride on Mobile Apps?
sponsored by TechTarget Security
EBOOK:
The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016
|
|
|
Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE:
Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016
|
|
|
It's time to tackle IoT security
sponsored by Ruckus Wireless
EGUIDE:
The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016
|
|
|
Securing Your Network in the Wireless Age
sponsored by Aruba Networks
EGUIDE:
In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
Posted: 01 Mar 2016 | Published: 24 Feb 2016
|
|
|
Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE:
In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016
|
|
|
Protecting Data on the Go
sponsored by TechTarget Security
EBOOK:
This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015
|
|
|
Information Security Magazine: August Issue
sponsored by TechTarget Security
EZINE:
Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015
|
|
|
The Transformation of Wireless Network Security
sponsored by TechTarget Security
EBOOK:
This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014
|
|
|
Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by TechTarget Security
WHITE PAPER:
Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014
|
|
|
Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER:
This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013
|
|
|
How to Handle Mobile Devices' Impact on the Network
sponsored by TechTarget Networking
EBOOK:
The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.
Posted: 14 Apr 2014 | Published: 14 Apr 2014
|
|
|
BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER:
Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013
|
|
|
IM Wireless Network Assessment
sponsored by Ingram Micro
ASSESSMENT TOOL:
The need to protect your data and organization is now even more critical than before. Take a look at this brief white paper to learn how one company can help you secure your business.
Posted: 09 Dec 2013 | Published: 09 Dec 2013
|
|
|
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by Symantec Corporation
EGUIDE:
Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
Posted: 09 Oct 2013 | Published: 09 Oct 2013
|
|
|
Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER:
This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013
|
|
|
Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER:
In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012
|
|