Infosecurity Reports

5 cybersecurity myths and how to address them
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate
sponsored by MicroScope
EZINE: An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.
Posted: 08 Feb 2021 | Published: 30 Jun 2017

MicroScope

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Get Smart About Threat Intel Tools and Services
sponsored by TechTarget Security
EBOOK: Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

TechTarget Security

Getting the most from cyberthreat intelligence services
sponsored by TechTarget Security
EZINE: A deluge of data is making it tough to put cyberthreat intelligence to work. This issue of 'Information Security' magazine focuses on what data makes a difference. This issue also includes a feature on top CISO concerns for 2020, plus an interview with Cisco's CISO Steve Martino.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

TechTarget Security

How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation

Analyst advice for IT security leaders
sponsored by IBM
WHITE PAPER: Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
Posted: 14 Nov 2013 | Published: 31 Mar 2013

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Information Security Threats: Building Risk Resilience
sponsored by TechTarget Security
EGUIDE: Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

TechTarget Security