Information Security Research
-
ITSM strategy for an agile, secure digital transformation
Sponsored by: TechTarget CIOAs digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
-
Cyber-Risk Strategies and Models for a Post-Perimeter Age
Sponsored by: TechTarget SecurityIn our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
-
Build your Content Security and Document Management Plan
Sponsored by: AdobeIn this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
-
Get Smart About Threat Intel Tools and Services
Sponsored by: TechTarget SecurityLearn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
-
Secure Information Exchange in the Digital Age
Sponsored by: OpenTextForrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
-
Crafting an Insider Threat Program: Why and How
Sponsored by: TechTarget SecurityTackling IT threats is even harder when the breach -- malicious or inadvertent -- originates in the company. Learn how to handle insider threats.
-
Judging MSSP Options With Care
Sponsored by: TechTarget SecurityThe managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider.
-
Minimizing Cyber Risk with Better Threat Detection and Incident Response
Sponsored by: TechTarget SecurityToday's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
-
Computer Weekly – 3 May 2016: How high-speed rail is accelerating innovation
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how HS2, the UK's planned high-speed railway, is developing its IT from scratch and having to predict the future. We hear from DevOps experts who try to bust some of the myths around continuous software delivery. And our latest buyer's guide analyses graph databases. Read the issue now.
-
Computer Weekly – 19 April 2016: The hunters who prey on cyber criminals
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now.
-
Computer Weekly – 12 April 2016: How IT in a portacabin supports £1bn London Bridge station overhaul
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how a temporary IT set-up based in a portacabin is supporting the UK's largest critical infrastructure project. Our latest buyer's guide looks at converged infrastructure products. And we analyse research showing data protection topping the list of UK security priorities. Read the issue now.
-
Optimize Patient Documentation with Enterprise Content Management
Sponsored by: ActianceIn this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
-
Computer Weekly – 9 February 2016: How Software Protects People
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.
-
December ezine: An issue covering cloud and security developments in the market
Sponsored by: MicroScopeTwo of the most explosive opportunities in the channel are cloud and security and we look ahead to what the market holds for resellers operating in those areas.
-
November ezine: An issue covering the latest techniques in selling security and what to pitch in Q4
Sponsored by: MicroScopeIn the wake of the TalkTalk hacking scandal it would be all too easy for the channel to use it to sell security, but that would be a mistake as customers want to hear more positive thoughts.
-
Global Threats and an Intelligent Response
Sponsored by: TechTarget SecurityIn today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.
-
Computer Weekly – 4 August 2015: Cyber risks hit the road
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.
-
Surviving in a State of DDoS Denial
Sponsored by: TechTarget SecurityDDoS attack prevention begins with understanding the nature of the latest sophisticated attacks. In this guide, leading security pros explain the mechanics of DDoS, the nature of the newest mega-attacks, and provide concrete, actionable guidance to make your systems as strong as possible.
-
The Essential Guide for Threat Intelligence Services: What to Look For
Sponsored by: TechTarget SecurityThis Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
-
Protecting Your Critical Data with Integrated Security Intelligence
Sponsored by: IBMAccess this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
-
How SIEM Helps IT Security, Compliance, Operations and Management
Sponsored by: CDW CorporationSecurity information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
-
Top 5 Truths About Big Data Hype and Security Intelligence
Sponsored by: Hewlett Packard EnterpriseThis resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Microsoft Office 365: Strengthening Security, Compliance, and Control
Sponsored by: MimecastThis white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
-
Preventing Dangerous File-Sharing
Sponsored by: GlobalscapeThis resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.