Infosecurity Reports

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

April ezine: SD-WAN more than just networking
sponsored by MicroScope
EZINE: An issue covering SD-WAN, storage innovations and opportunities for channel growth
Posted: 08 Feb 2021 | Published: 28 Mar 2019

MicroScope

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Computer Weekly – 9 February 2016: How Software Protects People
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.
Posted: 05 Feb 2016 | Published: 09 Feb 2016

TechTarget ComputerWeekly.com

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

Why Information Governance Must be Addressed Now, an Aberdeen Report
sponsored by IBM
ANALYST REPORT: This Aberdeen Group research report explores the challenges of data quality and information governance in the age of big data, and offers must-see advice for avoiding these problems and driving business success.
Posted: 16 Dec 2013 | Published: 31 Dec 2012

IBM

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

Modern Retention Enablement
sponsored by IBM
VIDEO: This quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.
Posted: 26 Jul 2013 | Premiered: 25 Jun 2012

IBM

Computer Weekly – 12 April 2016: How IT in a portacabin supports £1bn London Bridge station overhaul
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how a temporary IT set-up based in a portacabin is supporting the UK's largest critical infrastructure project. Our latest buyer's guide looks at converged infrastructure products. And we analyse research showing data protection topping the list of UK security priorities. Read the issue now.
Posted: 08 Apr 2016 | Published: 12 Apr 2016

TechTarget ComputerWeekly.com