IT Security Managers Reports

Focus: IT Security in the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
Posted: 08 Feb 2021 | Published: 16 Sep 2016

TechTarget ComputerWeekly.com

Resolve Web Security Issues with Industry Experts' Advice
sponsored by Veracode, Inc.
EGUIDE: Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020

ServiceNow

Discover the Most Important App Security Testing Basics
sponsored by Synopsys
EGUIDE: Use this expert e-guide by Kevin Beaver, a 16-year veteran of the security testing world to help you better understand how testing web apps for weaknesses in your security protocols can help you identify and rectify them before threats happen.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

All resources sponsored by Synopsys

Bridge the Network Security Gap in IP Multifunction Machines
sponsored by HP Inc
EGUIDE: In the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.
Posted: 25 Oct 2016 | Published: 24 Oct 2016

HP Inc

How to Start Building an Enterprise Application Security Program
sponsored by tCell
EGUIDE: In this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.
Posted: 20 Mar 2017 | Published: 16 Mar 2017

tCell

Security Analysis Principles and Techniques for IT Pros
sponsored by TechTarget Security
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

TechTarget Security

Security Analysis Principles and Techniques for IT Pros
sponsored by TechTarget Security
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

TechTarget Security

Optimize Your SIEM Operations
sponsored by McAfee, Inc.
RESOURCE CENTER: Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

McAfee, Inc.