• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
  • /
  • Data Loss Prevention (DLP)
flow-image
Sentinel One

The Complete Guide to Enterprise Ransomware Protection

The SentinelOne Complete Ransomware Guide will help you understand, plan for, respond to and protect against this now-prevalent threat. This guide offers examples, recommendations and advice to ensure you stay unaffected by the constantly evolving ransomware menace.

Published: May 30, 2022
View More
flow-image
Rockwell Automation

What Critical Infrastructure Organizations Must Do Now To Avoid 'The Big Shutdown'

Experts discuss top cybersecurity gaps and how to address them Retired U.S. General Gregory Touhill (Director of the Software Engineering Institute’s CERT Division) and former Rockwell Automation CISO Dawn Cappelli sat down for a interview with ISMG’s Tom Field, SVP of Editorial, to discuss the 2022...

Published: Jun 22, 2022
View More
flow-image
F5

Office of the CTO Report: Continuous API Sprawl

APIs are a contract between the service provider and service consumer. When any application uses an API, it needs to conform to an agreed-upon standard, with implicitly set expectations. What happens behind the scenes is of no concern to the consumer, enabling the service provider to use whatever means necessary to deliver...

Published: May 23, 2022
View More
flow-image
ServiceNow

Security Operations Use Case Guide

Responding to security incidents and vulnerabilities is an ongoing process, and you know that reacting too slowly to a critical incident can have drastic consequences. When teams are frequently understaffed, yet overwhelmed by alerts, automation along with orchestration can provide enormous benefit by making these teams...

Published: Apr 13, 2022
View More
flow-image
NortonLifeLock

What is ransomware and how to help prevent ransomware attacks

Knowing the types of ransomware out there, along with some of the dos and don’ts surrounding these attacks, can go a long way toward helping protect yourself from becoming a victim of ransomware. Read our article to discover more.

Published: Jun 13, 2022
View More
flow-image
Aruba

Frost Radarâ„¢: Global SD-WAN Vendor Market,2021

Aruba earns accolades from Frost & Sullivan. Check out the Frost Radar™: Global SD-WAN Vendor Market report to read why Frost and Sullivan recognized Aruba as a strong competitor in the #SDWAN market.

Published: May 24, 2022
View More
flow-image
Amazon Web Services: AWS

AWS for Healthcare: Accelerating the Future of Personalized Healthcare

For healthcare organizations, the challenge of providing patient centered care amid ever-increasing costs has never been greater. Inefficiencies are driving up operational expenses while reducing reimbursements and revenue. The lack of personalized care can lead to unnecessary or ineffective treatments and even costly...

Published: Mar 21, 2022
View More
flow-image
Illumio

How to Build Your Microsegmentation Strategy in 5 Steps

A breach to your organization's network is not a question of if, but when. Are you prepared with a micro-segmentation strategy when an attack happens? This guide provides in-depth, step-by-step best practices for implementing a micro-segmentation strategy from start to finish. You will learn: Why...

Published: Jun 07, 2022
View More
flow-image
Slack

Reinventing work

We’re coming off one of the most challenging years in business history. The pandemic forced every company to accelerate transformations that typically take years or even decades. Chief among them? The transition to a digital HQ. Prior to the pandemic, an organisation’s physical headquarters served as the...

Published: Apr 05, 2022
View More
flow-image
Fortinet

How To Simplify Security With Cybersecurity Mesh Architecture

As networks become more complex and distributed, detecting and responding to threats has become increasingly difficult. Addressing this through a “best of breed” or “point product” approach1 has led to security sprawl that complicates management, fragments visibility, and limits the ability of organizations...

Published: May 04, 2022
View More
flow-image
Tessian

Networks, Devices, People. How Human Layer Security Became The New Paradigm of Cybersecurity

Download the Whitepaper to learn: How 40 years of digitization has changed the threat landscape Which solutions global enterprises have historically relied on to ensure cybersecurity, and why they’re no longer effective Why AI/ML is your best bet in DLP and email security What Human Layer Security...

Published: May 27, 2022
View More
flow-image
ServiceNow

Reimagining IT service delivery and operations in unimagined times

Discover the top 3 ways adding Operation Management to your ITSM strategy can help your business be more resilient even in today’s challenging conditions: Drive down costs through 1000s of hours saved Swiftly scale as needs shift with automation and machine learning Deliver better service experiences,...

Published: Apr 01, 2021
View More
flow-image
ServiceNow

3 steps to transforming security operations

With cyberbreaches ever-rising in cost and frequency, you need to build more effective, collaborative IT security operations—by harnessing automation on a single platform. Read this guide for your three-step roadmap to enabling a stronger cybersecurity response. You’ll see how to optimise and automate processes,...

Published: Jun 21, 2022
View More
flow-image
Identiv

How Vulnerable Is Your Company to Cybersecurity Risks?

How can we, as individuals and companies, protect our businesses from cyberattacks? Which industries are at the greatest risk and what can we do to tackle those risks? In this post, we will discuss everything you need to know about the current cybersecurity situation to help you make informed business decisions....

Published: Jun 16, 2022
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon