Infosecurity Reports

The difficulties of defending against web tracking
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
Posted: 08 Feb 2021 | Published: 22 May 2018

TechTarget ComputerWeekly.com

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by TechTarget Security
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

TechTarget Security

Optimize Patient Documentation with Enterprise Content Management
sponsored by Actiance
EGUIDE: In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

November ezine: An issue covering the latest techniques in selling security and what to pitch in Q4
sponsored by MicroScope
EZINE: In the wake of the TalkTalk hacking scandal it would be all too easy for the channel to use it to sell security, but that would be a mistake as customers want to hear more positive thoughts.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

MicroScope

MicroScope April 2014: A special issue covering the information security market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling security, and advice on the use of social media.
Posted: 11 Apr 2014 | Published: 14 Apr 2014

MicroScope

Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by TechTarget Security
EBOOK: Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

TechTarget Security

Webcast: IBM Information Management in the New Era of Computing
sponsored by IBM
WEBCAST: Depending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation

Mobile Security Insider's Edition
sponsored by TechTarget Security
EZINE: This Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

TechTarget Security

Judging MSSP Options With Care
sponsored by TechTarget Security
EBOOK: The managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

TechTarget Security