• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
flow-image
Illumio

Oracle NetSuite Protects Flagship Business Applications With Illumio

Find out how SaaS leader Oracle NetSuite improves security and uptime for 7,500 application workloads with real-time visibility and Zero Trust segmentation.

Published: Jun 07, 2022
View More
flow-image
Barracuda

Spear Phishing: Top Threats and Trends

Cybercriminals are constantly refining their tactics and making their attacks more complicated and difficult to detect. In this in-depth report, Barracuda researchers share their insights on the most recent trends in social engineering and the new methods attackers are using to trick their victims.  Read now...

Published: Apr 27, 2022
View More
flow-image
NEUSTAR SECURITY

DDoS Disruption Impacts and the Need for Always-On Security

While details are murky in terms of what recovery from Covid-19 will look like, one thing is abundantly clear for enterprises around the world: the importance of expanding and securing their digital business footprint. Covid has driven companies to increase remote work and collaboration capabilities, migrate more assets...

Published: Mar 24, 2022
View More
flow-image
IronNet

6 Misconceptions about Collective Defense for Cybersecurity

Collective Defense uses collaboration and threat information sharing in new and powerful ways to reduce risk and improve the societal, commercial, and governmental ecosystems every enterprise depends upon to thrive. Yet while the idea of Collective Defense sounds practical, it is understandable that there are...

Published: Jun 15, 2022
View More
flow-image
Rapid7

What It Takes to Securely Scale Cloud Environments at Tech Companies Today

As the cloud becomes increasingly pervasive and complex, tech companies know they must take advantage of innovative services to scale up. At the same time, DevOps and security teams must work together to ensure that they are using the cloud securely, from development to production. Here are three ways...

Published: Jun 09, 2022
View More
flow-image
NEUSTAR SECURITY

Mighty Morphing Crypto Danger

With the skyrocketing value of cryptocurrencies, cryptomining – the processor-intensive work of earning cryptocurrency by verifying transactions – has become much more profitable. Especially when criminal cryptominers exploit your assets to get a free ride. Once, cryptomining malware 'only' hijacked...

Published: Mar 24, 2022
View More
flow-image
Illumio

5 Things You Might Not Know About Cloud Security

Many organizations underestimate the security risks of the cloud, often assuming public cloud providers will take care of any issues. Unfortunately, they won’t — especially when it comes to securing dynamic multi-cloud and hybrid environments. This ebook examines often overlooked cloud security challenges...

Published: Jun 07, 2022
View More
flow-image
Lookout

Securing Data and Collaboration in Office 365 for the Remote Workforce

With the surge in remote workplace collaboration, Office 365 today has emerged as the most popular SaaS application for employees to maintain business continuity. But this has introduced new cloud and data security challenges. This paper focuses on the emerging challenges facing today's organizations as they...

Published: Jun 15, 2022
View More
flow-image
Illumio

How to Build Your Microsegmentation Strategy in 5 Steps

A breach to your organization's network is not a question of if, but when. Are you prepared with a micro-segmentation strategy when an attack happens? This guide provides in-depth, step-by-step best practices for implementing a micro-segmentation strategy from start to finish. You will learn: Why...

Published: Jun 07, 2022
View More
flow-image
Illumio

Customer Stories: Better Cybersecurity Begins With Real-Time Visibility

Read this ebook to learn how leading organizations use Illumio’s real-time visibility and Zero Trust segmentation to defeat ransomware and other cyberattacks.

Published: Jun 07, 2022
View More
flow-image
Box

Box and ECM: Key integrations that drive digital transformation

Legacy ECM solutions simply can't keep up with the way you work today. Work is more mobile, more collaborative, more agile. Business processes must be intelligent. And customer expectations never stop growing.  Fortunately, cloud-based ECM solutions are rising to the challenge. Our new eBook,  Box and...

Published: May 13, 2022
View More
flow-image
VMware

Digital Acceleration in the line of coronavirus

A global survey of 600 technology decision-makers conducted by MIT Technology Review Insights, in association with VMware, finds that most organizations in Asia-Pacific and the world over had largely prepared for the online commerce and remote working the pandemic made compulsory. More than three-quarters of Asia-Pacific...

Published: Jun 20, 2022
View More
flow-image
Rockwell Automation

A Comprehensive Resource Guide for Securing Critical Infrastructure

Critical Infrastructure organizations are undergoing digital transformation, digitizing processes and adopting Internet of Things (IoT) technology to improve efficiency and reliability. The resulting connectivity of operational technology (OT) to the internet and the convergence between OT and IT have created extreme...

Published: Jun 30, 2022
View More
flow-image
NortonLifeLock

2021 Norton Cyber Safety Insights Report Global Results

Prepared by the Harris Poll on behalf of NortonLifeLock, we consider: 1. Cybercrime: Incidence, Impact, & Attitudes 2. Identity Theft: Incidence & Attitudes 3. Protecting Personal Privacy 4. Online Creeping 5. Demographics  

Published: Jun 13, 2022
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon