Email Content Security Hardware Reports

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

First edition of Computer Weekly 1966
sponsored by TechTarget ComputerWeekly.com
EBOOK: To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
Posted: 08 Feb 2021 | Published: 09 Sep 2016

TechTarget ComputerWeekly.com

CW500: A roadmap to software-defined everything – Morgan Stanley
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything – this presentation was given by Rob White, executive director of the global database group at Morgan Stanley.
Posted: 08 Feb 2021 | Published: 14 Oct 2016

TechTarget ComputerWeekly.com

Security Rating Scores for Third-Party Vendors Catching On
sponsored by BitSight
EGUIDE: In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
Posted: 23 Feb 2017 | Published: 15 Feb 2017

BitSight

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

Security Access Controls Over Identities Must Be Priority
sponsored by TechTarget Security
EGUIDE: No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
Posted: 12 Jun 2020 | Published: 12 Jun 2020

TechTarget Security

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Go Beyond Just Securing Your Cloud, Make it Better
sponsored by McAfee, Inc.
RESOURCE CENTER: Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

McAfee, Inc.

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT