ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Protocols Research

  • DTEX and the Insider Threat Kill Chain

    Sponsored by: Dtex

    With insider threats, you must ask yourself, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’. Preventing these attacks requires visibility and intelligence. Read this e-book for 5 steps to insider attack prevention.

  • Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.

  • IPV6 Transition – Why the rush ?

    Sponsored by: ComputerWeekly.com

    This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.

  • Designing a Strategy for End-to-End Web Protection

    Sponsored by: IBM

    Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.