• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
  • /
  • IT Threats & Vulnerabilities
flow-image
Rockwell Automation

What Critical Infrastructure Organizations Must Do Now To Avoid 'The Big Shutdown'

Experts discuss top cybersecurity gaps and how to address them Retired U.S. General Gregory Touhill (Director of the Software Engineering Institute’s CERT Division) and former Rockwell Automation CISO Dawn Cappelli sat down for a interview with ISMG’s Tom Field, SVP of Editorial, to discuss the 2022...

Published: Jun 22, 2022
View More
flow-image
Dell Technologies & AMD EPYC

Analyse: Accelerate data processing with Dell EMC PowerEdge servers

More and more industries are becoming reliant on their ability to process large volumes of data. For example, in the financial industry, crunching more data, placing trades quicker and developing smarter algorithms are now competitive advantages, all of which are enabled by technology. Dell Technologies and AMD work closely...

Published: Feb 09, 2022
View More
flow-image
RingCentral

Unified Communications as a Service

As businesses increasingly embrace a cloud-first strategy, many are migrating their most heavily used business applications — including office productivity, customer relationship management (CRM), customer care, and more — to the public cloud. In today’s remote workplace, in which work from home (WFH)...

Published: Jun 30, 2022
View More
flow-image
Workday USA

Create a Modern Software Strategy with AI-Driven Platforms and Their Ecosystems

Learn how your organization can move away from outdated legacy systems and transition to nimble, innovative solutions based on open ecosystems and a microservices-based approach.

Published: May 17, 2022
View More
flow-image
Illumio

Customer Stories: Better Cybersecurity Begins With Real-Time Visibility

Read this ebook to learn how leading organizations use Illumio’s real-time visibility and Zero Trust segmentation to defeat ransomware and other cyberattacks.

Published: Jun 07, 2022
View More
flow-image
Box

Hope is NOT a strategy: Secure your business with the Content Cloud

Seems like every week there's news of another cybersecurity breach. Ponemon Institute has found that the typical data breach costs an average of $3.9 million, and that just one breach can decrease your company's stock price by 5%. No one wants to be that kind of typical — no what can you do about it? ...

Published: May 13, 2022
View More
flow-image
Dell Technologies & AMD EPYC

Big Data for Finance

Across industries, data continues to grow as an extremely valuable resource. This is especially true in the financial services sector. “Financial services” is a broad term that encompasses commercial banks, investment houses and insurance companies. This highly competitive sector has been largely dominated...

Published: Apr 29, 2022
View More
flow-image
NEUSTAR SECURITY

DDoS Disruption Impacts and the Need for Always-On Security

While details are murky in terms of what recovery from Covid-19 will look like, one thing is abundantly clear for enterprises around the world: the importance of expanding and securing their digital business footprint. Covid has driven companies to increase remote work and collaboration capabilities, migrate more assets...

Published: Mar 24, 2022
View More
flow-image
Dell Technologies & Intel

Advance patient care with scalable all-flash data storage for your Epic EHR environment

Digital transformation continues to accelerate across all industries as organizations seek to increase efficiencies while responding to rapidly evolving trends and end user demands. Healthcare in particular is undergoing dramatic transformations in just about every area of care delivery due to the exponential growth in...

Published: May 04, 2022
View More
flow-image
Rockwell Automation

A Comprehensive Resource Guide for Securing Critical Infrastructure

Critical Infrastructure organizations are undergoing digital transformation, digitizing processes and adopting Internet of Things (IoT) technology to improve efficiency and reliability. The resulting connectivity of operational technology (OT) to the internet and the convergence between OT and IT have created extreme...

Published: Jun 30, 2022
View More
flow-image
Rockwell Automation

Assess Your Organization’s Cybersecurity Preparedness

Compare your scores to industry peers for key industrial security protections Attacks on Critical Infrastructure are on the rise. Organizations need to leverage modern industrial security practices to avoid preventable breaches and the costly downtime, damage and public safety risks they cause. This quick self-assessment...

Published: Jun 22, 2022
View More
flow-image
RingCentral

Enhancing Teams with enterprise-grade telephony

Today’s businesses depend on a robust communications experience to drive innovation, and phone calls are at the heart of that experience. However, it’s not just about picking up the phone and dialing a number these days. Today’s workers and customers connect with each other using several different...

Published: Jun 30, 2022
View More
flow-image
Rapid7

What It Takes to Securely Scale Cloud Environments at Tech Companies Today

As the cloud becomes increasingly pervasive and complex, tech companies know they must take advantage of innovative services to scale up. At the same time, DevOps and security teams must work together to ensure that they are using the cloud securely, from development to production. Here are three ways...

Published: Jun 09, 2022
View More
flow-image
IronNet

6 Misconceptions about Collective Defense for Cybersecurity

Collective Defense uses collaboration and threat information sharing in new and powerful ways to reduce risk and improve the societal, commercial, and governmental ecosystems every enterprise depends upon to thrive. Yet while the idea of Collective Defense sounds practical, it is understandable that there are...

Published: Jun 15, 2022
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon