Internet Security Research
-
IoT & the Enterprise: Exploring Opportunities and Challenges in Asia
Sponsored by: TechTarget ComputerWeekly.comGoing by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.
-
Focus ASEAN: Security & Digital Transformation
Sponsored by: TechTarget ComputerWeekly.comWith cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
-
Computer Weekly – 11 October 2016: Leadership bonus – analysing our UK salary survey
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.
-
How Can You Avoid a Web Security Breach? It's All in the Preparation
Sponsored by: TechTarget SecurityIn this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: TechTarget SecurityExpert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
-
DDoS Prevention For Attacks That Bypass DNS Rerouting
Sponsored by: RadwareIn this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
-
How Healthcare Organizations are Tackling IoT Device Management
Sponsored by: Cisco UmbrellaConnected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
-
How to Handle the IoT from the Data Center to Security
Sponsored by: Xively by LogMeInIn this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.
-
Save Your Future Self With Security Now
Sponsored by: TechTarget Software QualitySecure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.
-
Cybersecurity Risks Masked by Controversial Vulnerability Counts
Sponsored by: Symantec Website SecurityIn this expert e-guide, learn why experts are saying vulnerability reports aren't as dependable as you think. Discover why your organization should focus on managing risk exposure rather than rely on vulnerability counts.
-
Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
Sponsored by: TechTarget ComputerWeekly.comIn this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
What to Look for in Web Application Firewall Products
Sponsored by: TechTarget SecurityIn this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
Protecting Your Critical Data with Integrated Security Intelligence
Sponsored by: IBMAccess this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
-
Protect People, Processes and Technology from Web Application Threats
Sponsored by: IBMSecuring externally facing applications is an important step toward safeguarding your critical assets. Find out why.
-
Five Critical Steps to Achieving an Effective Application Security Program
Sponsored by: IBMDiscover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
-
Banca Intesa Counters Threats with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseExplore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
-
Internet-Scale Identity Systems:An Overview and Comparison
Sponsored by: Ping Identity CorporationThis white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
The Tangled Web of Data Privacy Issues
Sponsored by: Thawte Inc.In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more.
-
SSL Certificate Management: Avoiding Common Mistakes
Sponsored by: Symantec CorporationThis expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.
-
Website Security Threat Report, Part Two
Sponsored by: Symantec CorporationThis website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
-
Protecting Your Website With Always On SSL
Sponsored by: Symantec CorporationThis white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.