Security Protocols Reports

Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 08 Feb 2021 | Published: 17 May 2019

TechTarget ComputerWeekly.com

Computer Weekly – 30 May 2023: Can the UK cash in on chips?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
Posted: 26 May 2023 | Published: 30 May 2023

TechTarget ComputerWeekly.com

SME security - a business imperative
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 08 Feb 2021 | Published: 07 Aug 2017

TechTarget ComputerWeekly.com

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

TechTarget ComputerWeekly.com

Trouble at your door: targeted cyber attacks in the UK and Europe
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 08 Feb 2021 | Published: 29 Sep 2016

TechTarget ComputerWeekly.com

Resolve Web Security Issues with Industry Experts' Advice
sponsored by Veracode, Inc.
EGUIDE: Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint
EGUIDE: In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016

Proofpoint

Is Managed Security Monitoring Right for Your Organization?
sponsored by IBM
WHITE PAPER: The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
Posted: 07 Nov 2016 | Published: 25 Jul 2016

IBM

Security Rating Scores for Third-Party Vendors Catching On
sponsored by BitSight
EGUIDE: In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
Posted: 23 Feb 2017 | Published: 15 Feb 2017

BitSight