Strengthening Web Application Security: Charting a Robust Strategy That Starts at Development.
By: IBM View more from IBM >>
Download this next:
Improve application security across your AWS environment
By: Contrast Security
Type: Product Overview
Securing applications and APIs in the cloud is critical for financial services institutions undergoing digital transformation.
This overview explores how to extend AWS’s security to the application layer with help from Contrast Security.
Along with unpacking how the strategy works, the overview outlines 7 benefits that it can offer, including:
- Less false positives
- Accelerated development cycles
- Real-time threat detection and mitigation
- And more
Continue on to discover the rest.
These are also closely related to: "Strengthening Web Application Security: Charting a Robust Strategy That Starts at Development."
-
Quantifying the risks for applications that operate outside a firewall
By: Digital.ai
Type: eBook
The term “in the wild” refers to software set free into the world and is no longer under the author’s control... including the malware and viruses created to compromise apps and penetrate firewalls.
Unfortunately, the vast majority of cybersecurity research examines threats to apps operating inside a firewall. But with a staggering 100 billion mobile apps downloaded in 2021 alone, it has become clear that the dearth of monitoring and research of apps in the wild only exacerbates the security risk.
Download this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.
-
Remediation recommendations for open-source software risks
By: Sonatype
Type: White Paper
Part and parcel with the boom in open-source component usage, there has been a 742% average annual increase in software supply chain attacks over the past three years, according to a State of the Software Supply Chain report.
In terms of open-source components, software dependencies can equal open-source vulnerabilities. Sonatype research found that 6 out of every 7 project vulnerabilities come from transitive dependencies.
To empower your developers in leveraging open-source components while mitigating risk, read this white paper. Inside, Sonatype evaluates the top 5 open-source components, their vulnerabilities, and remediation recommendations.
Find more content like what you just read:
-
App Sec Tools Need a Software Supply Chain Security Upgrade.
By: ReversingLabs
Type: White Paper
Learn why traditional application security testing tools alone leave your organization exposed to supply chain attacks — and how software supply chain security tools represent an evolution of traditional application security tools, ensuring end-to-end software security.
-
Eliminate your API vulnerabilities with Cequence Unified API Protection
By: Cequence
Type: Data Sheet
Today’s security teams simply lack the visibility and defense capabilities they need to protect the ever-growing risk from APIs and other application connections. Check out this data sheet to see how the Cequence Unified API Protection solution can reinforce the vulnerabilities that may undermine your organization.
-
How a game developer stayed secure without impacting UX
By: Digital.ai
Type: Case Study
A video game developer was having massive success with a recent release, but as its popularity increased, so did attempts from threat actors to tamper with the software. Read this case study to discover how the developer was able to leverage a trusted partner to establish integrated application security and effective cheat countermeasures.
-
Security audits: How to prep for a more successful experience
By: Dell Software
Type: eGuide
In this expert e-guide, we explore how you can prepare for and participate in a security audit. Find out what you should do in advance to get ready for the auditor's visit and how to address gaps once they've been identified.
-
Ask the experts: Discover how to handle external security auditors
By: Dell Software
Type: eGuide
A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
-
5G vs. Wi-Fi 6: What's the difference?
By: TechTarget ComputerWeekly.com
Type: Infographic
Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
-
Toughening up web and mobile application security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
-
Behind The Curtain: What HITRUST Auditors Really Look For
By:
Type: Talk
Are you preparing for your HITRUST certification and wondering what auditors are truly focused on? Join us for an exclusive, behind-the-scenes look at what HITRUST auditors prioritize during the certification process. This webinar will demystify the audit experience, revealing key insights from certified HITRUST Assesor, Christopher Shaffer to help your organization avoid common pitfalls and meet auditor expectations with confidence. We will spotlight the areas auditors scrutinize most, and share actionable tips to ensure that you're fully prepared. Whether you're just starting your HITRUST journey or looking to fine-tune your readiness, this webinar will equip you with the knowledge and strategies needed to succeed. Don't miss this opportunity to gain exclusive insider knowledge and set your organization up for HITRUST certification success. Key Takeaways: Avoid common mistakes that could derail your certification efforts. Understand the key stages of the HITRUST audit process. Discover what auditors prioritize and why. Learn actionable strategies to meet and exceed auditor expectations. This session is ideal for organizations seeking HITRUST certification.
-
Enhancing Internal Audit’s Impact with AI & Analytics
By:
Type: Video
With a rapidly-changing regulatory environment, a growing shortage of trained professionals, and other macro challenges, today’s internal audit, risk, and compliance professionals are faced with increasing demands to “do more with less” and to help their organizations build resilience against emerging risks. While auditors have leveraged elements of artificial intelligence (AI) and data analytics for years to help them tackle expanding demands, the release of several generative AI models has introduced even more opportunities for internal auditors to transform processes with technology. Join us as we explore ways internal auditors can broaden their use of data analytics, apply AI—including gen AI—to add more value not only to their own team, but also by expanding the use of technology across the first and second lines as well. We’ll also examine the risks AI introduces, strategies for mitigating these risks, and practical examples of how audit departments are using AI. Learning objectives: -Understand how internal auditors are leveraging data analytics, bots, and other forms of AI to gain efficiencies and expand coverage -Discover how gen AI can help internal auditors enhance their understanding of risks facing their organization -Recognize risks inherent in the use of AI, determine steps internal auditors can take to mitigate those risks, and discuss what auditors should consider as regulations around AI evolve -Outline specific examples of how internal auditors are using AI to increase their impact on their organizations Some or all of the services described herein may not be permissible for KPMG audit clients and their affiliates or related entities.
-
Maximizing Internal Audit's Impact with AI & Analytics
By:
Type: Video
With a rapidly-changing regulatory environment, a growing shortage of trained professionals, and other macro challenges, today’s internal audit, risk, and compliance professionals are faced with increasing demands to “do more with less” and to help their organizations build resilience against emerging risks. While auditors have leveraged elements of artificial intelligence (AI) and data analytics for years to help them tackle expanding demands, the release of several generative AI models has introduced even more opportunities for internal auditors to transform processes with technology. Join us as we explore ways internal auditors can broaden their use of data analytics, apply AI—including gen AI—to add more value not only to their own team, but also by expanding the use of technology across the first and second lines as well. We’ll also examine the risks AI introduces, strategies for mitigating these risks, and practical examples of how audit departments are using AI. Learning objectives: -Understand how internal auditors are leveraging data analytics, bots, and other forms of AI to gain efficiencies and expand coverage -Discover how gen AI can help internal auditors enhance their understanding of risks facing their organization -Recognize risks inherent in the use of AI, determine steps internal auditors can take to mitigate those risks, and discuss what auditors should consider as regulations around AI evolve -Outline specific examples of how internal auditors are using AI to increase their impact on their organizations Some or all of the services described herein may not be permissible for KPMG audit clients and their affiliates or related entities.
-
Top Imperatives for Audit Leaders in 2024
By:
Type: Replay
After almost four years of perpetual risk-induced disruption, internal auditors are ready to put the era of permacrisis behind them. But 2024 will likely bring more of the same. Join Richard Chambers for this impactful webinar, with a focus on the key lessons learned in the past year, the challenges and opportunities that lie ahead for internal auditors, and five imperatives that every internal auditor should commit to this year. * CPE: This is a webinar recording. Credits are not offered for on-demand viewing.
-
5 Internal Auditor Resolutions for the Year Ahead
By:
Type: Replay
After almost four years of perpetual risk-induced disruption, internal auditors are ready to put the era of permacrisis behind them. But 2024 will likely bring more of the same. Join Richard Chambers for a webinar, with a focus on the key lessons learned in the past year, the challenges and opportunities that lie ahead for internal auditors, and five New Year’s resolutions every internal auditor should commit to. * CPE: This is a webinar recording. Credits are not offered for on-demand viewing.
-
It’s 2023! Five Internal Auditor Resolutions for the Year Ahead
By:
Type: Replay
After three years of unprecedented disruption, internal auditors are ready to put risk bedlam in the rearview mirror. But 2023 is promising more of the same. Join Richard Chambers for his first AuditBoard webinar of 2023 where the focus will be on the key lessons learned in the past year, vital strategic risks internal auditors face in the year ahead, and five New Year’s resolutions to which every internal auditor should commit. CPE: This is a webinar recording. Credits are not offered for on-demand viewing.
-
The Ethical Internal Auditor: Keeping an Eye Out for Your Blind Spots
By:
Type: Replay
Ethical resilience is often listed as one of the top attributes of high-performing internal auditors and audit leaders in organizations around the world. To learn and sustain trust in the organizations they serve, internal auditors must conform to the profession’s code of ethics, and they must also bring a strong moral compass to their role. Internal auditors must guard against “blind spots” - a temporary inability to see the ethical aspect of behavior or a decision being made. This session will explore how to identify/navigate blind spots and other challenges and opportunities as they model ethical behavior in their organization. CPE: This is a webinar recording. Credits are not offered for on-demand viewing.
-
How AI Evolves Internal Audit’s Strategic Impact
By:
Type: Video
As the pace of technology accelerates and the complexity of regulatory environments increases, the demand for adaptive, continuous oversight has never been more critical. Join internal audit experts Harold Silverman, Senior Director, Audit Committee and Corporate Governance Engagement at the Institute of Internal Auditors (the IIA), and Ernest Anunciacion, Head of Product Marketing, and former Chief Audit Executive (CAE) for a deep dive into considerations that internal auditors must take to be AI-ready. In this session, they will discuss how AI-powered risk intelligence platforms are reimagining expectations for the next era of auditors from traditional compliance activities to a more dynamic, strategic function that drives significant organizational value. Key Topics - Practical AI Applications: Learn about the considerations internal auditors have around implementing AI as part of their methodologies as well as auditing their organizations usage of such technologies. - Advanced Risk Intelligence: Dive into how AI integration redefines internal audit processes, boosting efficiency and adding strategic value beyond traditional compliance. - Delivering Organizational Value: Learn how risk intelligence platforms leverage AI to provide continuous monitoring of financial transactions, enabling auditors to proactively manage risks and enhance decision-making capabilities.
-
Getting the Most Out of Your Specops Password Auditor Report
By:
Type: Talk
Please join cybersecurity expert, Darren Siegel along with Nathan Johnson as they share how you can get the most out of your Specops Password Auditor reports. They will discuss the password vulnerabilities uncovered in your results, what you should be doing about them and how often you should scan your Active Directory. Specops Password Auditor is a free read only tool that scans your AD for over 950 million unique compromised passwords and other password vulnerabilities that could be lurking in your AD! If you haven’t scanned your Active Directory yet you can download Specops Password Auditor here: https://specopssoft.com/product/specops-password-auditor/ Don’t let go of the security-related weaknesses related to password settings that are detected. Understand what the collected information is telling you in the display of multiple interactive reports containing user and password policy information. With multiple reports that include, a summary of accounts using compromised passwords, identical passwords, and many more you will be able to see a comparisons of your organization's password settings with industry standards and best practices according to multiple official standards.
-
With Oversight, university identifies $460,000 in erroneous expenses
By: Oversight Systems
Type: Case Study
As a major educational institution, Texas A&M University’s financial auditing team encountered challenges due to high transactional volumes and lengthy audit processes. By adopting Oversight’s solution, the
-
Texas A&M University transforms audit process
By: Oversight Systems
Type: Case Study
As a major educational institution, Texas A&M University’s financial auditing team encountered challenges due to high transactional volumes and lengthy audit processes. By adopting Oversight’s solution, the
-
Year-end accounting issues 2020/21
By:
Type: Talk
2020/21 is a year unlike any other as a result of Covid-19 and the impact it has had on NHS bodies – not just operationally but financially. ‘Usual’ judgments and estimates will need to be revisited, changes to policy have to be reflected in the accounts and finance teams and auditors will be working remotely again. This webinar will provide an auditor’s view on the key issues that NHS bodies need to consider as they prepare their annual report and accounts.
-
Password auditing guide
By: Specops Software
Type: White Paper
Audit your Active Directory to uncover password-related security risks. Discover compromised passwords, expired accounts, and more. Download this free password auditing guide to secure your organization.
-
Navigating ISO 27001 Certification Audits: An Auditor's Guide to Success
By:
Type: Talk
Getting ISO 27001 certified can be challenging, especially when it comes to preparing for and undergoing the certification audit. Even experienced professionals can find themselves trying to figure out exactly what to expect and how to demonstrate compliance most effectively. In this informative webinar, a panel of seasoned ISO 27001 auditors will provide an in-depth guide to successfully navigating your first ISO 27001 certification audit. Drawing on their experience performing information security management system (ISMS) audits, the panel will outline what auditors look for and common pitfalls to avoid. Key topics covered will include: • Understanding the ISO 27001 audit process and timeline • Ensuring documentation meets certification requirements • Identifying and preparing key personnel who will interface with auditors • Developing and practising responses for likely auditor questions • Proactively addressing gaps to avoid non-conformities • Maintaining compliance after certification • How the ISMS.online platform gets you 81% of the way towards compliance straight out of the box Whether you're an ISO Coordinator preparing for an upcoming audit or a member of the information security team supporting audit readiness, this webinar will equip you with the practical knowledge needed to achieve certification on the first attempt. You'll walk away with a checklist of specific actions to demonstrate compliance when the auditors arrive. . Reserve your place now for a session that promises to enlighten and empower you in mastering ISO 27001 audits. Elevate your organisation's security measures and align with global standards.
-
Steering the Shift of Software Innovation
By: AWS
Type: eBook
What opportunities do the cloud and SaaS provide for software developers? Download this e-book to discover 8 of them and to learn about a partner that can help your software developers realize the benefits.
-
Computer Weekly 4 February 2020: Ethics and the internet how to build a web we can trust
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
-
The internal auditor’s guide to thriving in an AI-driven world
By:
Type: Video
With AI taking center stage, internal auditors must adapt to new tools and techniques to remain effective and relevant. This panel will provide comprehensive insight for internal auditors looking to thrive in this environment. The discussion will cover the skills and knowledge required to work with AI, the impact of AI on audit processes, and ways AI can enhance decision-making and fraud detection. Experts will share experiences, best practices, and practical advice on how to embrace AI technologies. Attendees will gain the insights needed to leverage AI for improved audit outcomes, efficiency, and proactive risk management. Key Topics: - The critical AI skills that every internal auditor needs to master - The profound impact of AI on traditional internal auditing processes - How AI enhances decision accuracy and is revolutionizing fraud detection
-
Year-end 2021/22 accounting and auditing issues
By:
Type: Talk
This webinar will consider the key issues that preparers of accounts should consider in 2021/22. It will provide an auditor’s view on the latest changes to the reporting frameworks and other areas which will have an impact on this year’s audits. These will include the introduction of IFRS16 along with the changes to the remuneration report and fair pay disclosures. The audit of the 2020/21 annual report and accounts was generally accepted to be difficult so the speakers will also consider what both NHS bodies and their auditors can do to make the process easier this year.
-
A guide to developing modern mobile applications
By: TechTarget ComputerWeekly.com
Type: eBook
A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.
-
Infographic: Amazon EC2 Instance - types, features and pricing options
By: TechTarget Search AWS
Type: Infographic
An Amazon EC2 instance is a virtual server in Amazon's Elastic Compute Cloud (EC2) scalable compute platform for running applications on the Amazon Web Services (AWS) cloud. Amazon EC2 provides various types of instances of different sizes. Find out in this infographic about the Amazon EC2 instance types, features and pricing options.
-
Towards Continuous Auditing: How DevOps is Reshaping Traditional Audit Practices
By:
Type: Talk
As DevOps takes root at organizations, the day-to-day practices in IT change in ways that are foreign to many auditors. This talk discusses how and why these new practices can potentially improve compliance and accelerate audit practices.
-
Agile Web Application Security in 2024
By:
Type: Talk
Join Thomas Stacey, Application Security Auditor at Outpost24 to discuss web application security and pen testing for agile development teams in 2024. We'll dive into the pros and cons of in-house versus outsourced pen testing, hybrid pen testing as a service, what to look out for in an audit in 2024 including recent findings from Tom's own pen testing, and how to best utilize automation in your org's security posture. Tom has some fascinating findings to share including some oldie-but-goodies you shouldn't overlook. Plus, we'll take answer your questions live in an "ask the pen tester" format.
-
Computer Weekly – 21 February 2017: How to develop mobile apps for business
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our latest buyer's guide examines the emerging innovations and best practice in mobile app development. We find out how Microsoft and Amazon are opening up their artificial intelligence tools to developers. And GE's CIO discusses the digital transformation of one of the world's industrial giants. Read the issue now.
-
7 best practices for Web3 security risk mitigation
By: TechTarget ComputerWeekly.com
Type: eGuide
Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.
-
ESG: What Internal Auditors Need to Know
By:
Type: Replay
The accelerating change of pace in both society and the climate is sharpening stakeholder focus on environmental, social, and governance (ESG) risks facing many organizations today. As auditors, we’re uniquely positioned to act as catalysts for furthering an organization’s ESG goals while helping to identify potential obstacles. In this session, you’ll learn what auditors really need to know about ESG, including: - The changing ESG regulatory environment. - Implementing an ESG program and how internal audit can assist. - Design and testing considerations for ESG internal controls. - Example ESG disclosures. CPE: This is a webinar recording. Credits are not offered for on-demand viewing.
-
Continuous Compliance & Automated Governance
By:
Type: Talk
Compliance and governance don't immediately spring to mind as joyful. In episode 55 of Day-to-Day DevOps, Helen Beal and guests turn the spotlight to how continuous compliance and automated governance can bring your auditors and regulators joy.
-
Key software development trends to drive business success
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
-
Application Security
By:
Type: Replay
This webinar will be presented by Aaron Scurlock, a Senior Auditor at Logically. Aaron has over 15 years’ experience in IT management where he implemented policies, procedures, and security risk and compliance. During this webinar, he will review the elements of application security within your environment.
-
Application Security
By:
Type: Replay
This webinar will be presented by Aaron Scurlock, a Senior Auditor at Logically. Aaron has over 15 years’ experience in IT management where he implemented policies, procedures, and security risk and compliance. During this webinar, he will review the elements of application security within your environment.
-
Application Security
By:
Type: Replay
This webinar will be presented by Aaron Scurlock, a Senior Auditor at Logically. Aaron has over 15 years’ experience in IT management where he implemented policies, procedures, and security risk and compliance. During this webinar, he will review the elements of application security within your environment.
-
Application Security
By:
Type: Video
This webinar will be presented by Aaron Scurlock, a Senior Auditor at Logically. Aaron has over 15 years’ experience in IT management where he implemented policies, procedures, and security risk and compliance. During this webinar, he will review the elements of application security within your environment.
-
Application Security
By:
Type: Replay
This webinar will be presented by Aaron Scurlock, a Senior Auditor at Logically. Aaron has over 15 years’ experience in IT management where he implemented policies, procedures, and security risk and compliance. During this webinar, he will review the elements of application security within your environment.
-
How you can automate T&E spend analysis & compliance with AI
By: Oversight Systems
Type: White Paper
Automating T&E expense reporting can eliminate manual approval processes and reduce fraud, waste, and misuse. AI-powered transaction analysis identifies high-risk spending patterns to streamline compliance. Download this white paper to learn how you can transform your expense audit and compliance process.
-
It’s Not You, It’s Me. Go From Frenemy to Friend With Security Automation.
By:
Type: Talk
Improve your relationship with your developers and auditors, protect your environment, and go from frenemy to friend through streamlined processes and automated detective and corrective controls. This session will cover tips on ways to address human error elements for development within your Google Cloud environment.
-
Eliminate Timesheets with Agile Capitalization
By:
Type: Talk
Efforts to track and capitalize creative employee labor—from engineers, designers, architects, etc.—usually create more problems than they solve. If employees record time as they work, their productivity drops; if they estimate time every week, auditors question the results; if a manager estimates employee time, auditors could insist on timesheets. Agile Capitalization uses standard agile artifacts to report creative labor costs, such as: stable teams, sprints, backlog items, story points etc. Auditors love the verifiability, objectivity, and clarity of the approach. You’ll likely find added benefits: more attractive balance sheets, greater agile alignment, lower waste, higher engagement, and better collaboration. Dr Dan Greening (Senex Rex) leads this webinar with Rally’s Gwen Gelsinon and Christopher Pola. Dan brings a wealth of experience implementing Agile Capitalization in large companies and startups. Bring your Finance folks along! Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.
-
A Fireside Chat: Roles of Auditors, Technology, and Education in Cloud Assurance
By:
Type: Video
In this fireside chat, we will discuss the importance of Cloud Assurance Programs and Ecosystems, specifically focusing on the role of auditors, technology, and education. Cloud computing has become a critical component of modern businesses but presents unique security and compliance challenges. The panelists will delve into how organizations can ensure the security and reliability of their cloud systems by implementing robust assurance programs and ecosystems. The discussion will also explore the latest technological advancements in cloud security, including automation and artificial intelligence, and how they can be leveraged to strengthen cloud assurance. Additionally, the panelists will discuss the importance of ongoing education and training for auditors, IT professionals, and business leaders to keep up with the ever-evolving cloud security landscape. This fireside chat aims to provide insights and practical advice for organizations seeking to establish and maintain effective cloud assurance programs and ecosystems.
-
The Future of SOX and Internal Audit: Automation, Analytics, and Bots
By:
Type: Replay
The internal audit function is in the midst of digital transformation. Learn how automation and analytics are reshaping what an auditor's job can be and how you can build a data-driven audit program using automation, analytics, and bots to drive efficiency and effectiveness in controls. CPE: This is a webinar recording. Credits are not offered for on-demand viewing.
-
Assessing Your Cloud Service Providers:Impact of Security & Privacy in the Cloud
By:
Type: Talk
Due to the popularity and benefits of the cloud, many organizations are moving to the cloud without a well-thought-out strategy, which increases the organization's risk profile. The primary goal of this presentation is to provide attendees with a roadmap for evaluating their Cloud Service Providers and making their organizations more secure. Additionally, we will discuss the impact of security and privacy in the cloud, which auditors should consider.
-
Which risks should we focus on? Session from Internal Audit Conference in Spain
By:
Type: Video
In this talk, David Vose will discuss some examples to: • Help businesses focus on the risks that most seriously jeopardize its strategic goals • Help auditors focus on the controls that the business most relies upon to be effective • Help ensure that a business has the right level of insurance cover • Determine the most cost-effective means for managing a portfolio of risks
-
Case Study: High flying clouds - AWS bucks traditional business growth trends with help from the enterprise
By: TechTarget ComputerWeekly.com
Type: eGuide
The Amazon Web Services (AWS) public cloud juggernaut continues to go from strength to strength from quarter to quarter, but what is fuelling its non-traditional revenue growth trends?
-
A Computer Weekly buyer's guide to secure and agile app development
By: TechTarget ComputerWeekly.com
Type: eGuide
As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding
-
Top 10 ASEAN stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money's adoption of OpenShift, Go-Jek's experience with the cloud and Singapore's approach to the internet-of-things, among other developments.
-
Disaster Recovery Plans for Apache Kafka®
By:
Type: Video
In this session, we discuss disaster scenarios that can take down entire Kafka clusters and share advice on how to plan, prepare and handle these events. This is a technical session full of best practices - we want to make sure you are ready to handle the worst mayhem that nature and auditors can cause. This is part 4 out of 5 in the Best Practices for Apache Kafka in Production Confluent Online Talk Series.
-
Avoiding the Phish Bowl
By:
Type: Replay
Phishing emails are the easiest way for cyber criminals to get into your environment. This webinar will review best practices for phishing. You will see real-world examples of phishing emails and learn more about the impact of clicking on these emails. This webinar is presented in partnership with the Portland Regional Chamber of Commerce. The presenters are Tyler Booker, Senior Auditor, and Jeffrey Bell, Security, Audit, and Compliance Intern, of Logically.
-
Avoiding the Phish Bowl
By:
Type: Replay
Phishing emails are the easiest way for cyber criminals to get into your environment. This webinar will review best practices for phishing. You will see real-world examples of phishing emails and learn more about the impact of clicking on these emails. This webinar is presented in partnership with the Portland Regional Chamber of Commerce. The presenters are Tyler Booker, Senior Auditor, and Jeffrey Bell, Security, Audit, and Compliance Intern, of Logically.
-
Avoiding the Phish Bowl
By:
Type: Replay
Phishing emails are the easiest way for cyber criminals to get into your environment. This webinar will review best practices for phishing. You will see real-world examples of phishing emails and learn more about the impact of clicking on these emails. This webinar is presented in partnership with the Portland Regional Chamber of Commerce. The presenters are Tyler Booker, Senior Auditor, and Jeffrey Bell, Security, Audit, and Compliance Intern, of Logically.