• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
flow-image
Fortinet

Addressing Multiple Concerns with a Single Solution

Whilst the unprecedented speed of innovation the world is experiencing has innumerable benefits, the quick pace of implementation is leaving companies vulnerable to cyberattacks.  The past two years have witnessed a great increase in ransomware attacks, aimed at all types of organizations and at all security...

Published: May 13, 2022
View More
flow-image
Workday USA

IDC Industry Spotlight: Improving Resiliency, Agility, and the Student Experience in U.S. Higher Education

Higher education institutions facing declining funds, changing student needs, and rapid growth in online offerings need to be able to respond with innovations in business models and services. In this guide, learn how your institution can use cloud-based systems to: Create more convenient and seamless workflows...

Published: Apr 20, 2022
View More
flow-image
Dragos

Whitepaper: How Dragos Activity Groups Obtain Initial Access into Industrial Environments

As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs). One such example of this is the Initial Access Tactic. ...

Published: May 05, 2022
View More
flow-image
NEUSTAR SECURITY

Mighty Morphing Crypto Danger

With the skyrocketing value of cryptocurrencies, cryptomining – the processor-intensive work of earning cryptocurrency by verifying transactions – has become much more profitable. Especially when criminal cryptominers exploit your assets to get a free ride. Once, cryptomining malware 'only' hijacked...

Published: Mar 24, 2022
View More
flow-image
Fortinet

How To Simplify Security With Cybersecurity Mesh Architecture

As networks become more complex and distributed, detecting and responding to threats has become increasingly difficult. Addressing this through a “best of breed” or “point product” approach1 has led to security sprawl that complicates management, fragments visibility, and limits the ability of organizations...

Published: May 04, 2022
View More
flow-image
NEUSTAR SECURITY

DDoS Disruption Impacts and the Need for Always-On Security

While details are murky in terms of what recovery from Covid-19 will look like, one thing is abundantly clear for enterprises around the world: the importance of expanding and securing their digital business footprint. Covid has driven companies to increase remote work and collaboration capabilities, migrate more assets...

Published: Mar 24, 2022
View More
flow-image
Dragos

Report: ICS/OT Cybersecurity 2021 Year in Review

Dragos is excited to present the fifth year of the annual Dragos Year In Review report on Industrial Control System (ICS)/ Operational Technology (OT) cyber threats, vulnerabilities, assessments, and incident response observations. The ICS/ OT community has long suffered from more anecdotes on security than insights...

Published: Apr 27, 2022
View More
flow-image
Nasuni

Key Factors to Consider when Evaluating Enterprise Cloud File Storage Solutions

Storage requirements never stop evolving. Thus, the idea of what constitutes an effective enterprise file storage solution has changed over time. As cloud computing and hybrid work become more common, and the cyberthreat landscape grows more ominous, storage managers are using a new set of criteria as they evaluate more...

Published: May 13, 2022
View More
flow-image
Fortinet

How To Simplify Security With Cybersecurity Mesh Architecture

Networks are becoming increasingly sophisticated and widely distributed, which is making them even more vulnerable to cybersecurity threats.  Organizations are in need of a cybersecurity platform that limits these threats, unifies fragmented visibility, and enables enterprises to respond effectively and efficiently...

Published: May 13, 2022
View More
flow-image
Immersive Labs

The Psychology of Cyber: How Micro-Drilling Enhances Crisis Response

As with many entrepreneurial journeys, Immersive Labs began as a solution to a problem. Anecdotal evidence showed this was because the best cybersecurity talent was progressive and impatient to improve, while the teaching techniques were not. Rooted in static classroom-based learning, skills quickly dated and left...

Published: Mar 02, 2022
View More
flow-image
Fortinet

Making Cybersecurity Mesh Architectures a Reality With the Fortinet Security Fabric

As cyber threats become increasingly sophisticated, organizations are in need of a security platform that outperforms bad actors and their malware. The Fortinet Security Fabric is enabling organizations to make the most of their top-op-the-line networks and broad reach; it delivers automated capabilities that are...

Published: May 13, 2022
View More
flow-image
F5

Continuous API Sprawl Challenges and Opportunities in an API-Driven Economy.

The Application Programming Interface (API) economy is the totality of all public and private APIs that exist globally at any given moment. It is continuously expanding and will soon reach a point where it will become a driving force in the global economy. Just as the oil industry has dominated every aspect of our lives...

Published: May 10, 2022
View More
flow-image
ServiceNow

Activate ESG Use Case Guide Discover more ways ServiceNow can help you drive ESG impact and value

Environmental, Social, and Governance (ESG) is about driving business growth while building a more sustainable, equitable, and ethical future. In simple terms, ESG is about doing well BY doing good. ESG topics include climate, waste, human rights, diversity, and philanthropy, as well as topics that are considered traditional...

Published: Apr 13, 2022
View More
flow-image
ServiceNow

Reimagining IT service delivery and operations no matter what comes your way

The light at the end of the pandemic tunnel has also illuminated some continued opportunities The tragic and challenging times we’ve lived through have been a catalyst for some brilliant ideas, especially around reimagining operational models. But the continued fluidity in how your employees work continues to strain...

Published: Apr 13, 2022
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon