Security News White Papers

Universal Storage for Data Lakes: An ESG Evaluation

Security News White Papers - Thu, 12/07/2017 - 12:00am
This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more. Published by: Dell EMC

Web security: Important but often overlooked

Security News White Papers - Fri, 12/01/2017 - 12:00am
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls. Published by: ComputerWeekly.com

Gamma International: The Macedonia files - Source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

Security News White Papers - Thu, 11/30/2017 - 12:00am
This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia. Published by: ComputerWeekly.com

Essential Guide: What the EU Data Protection Regulation changes mean to you

Security News White Papers - Mon, 11/27/2017 - 12:00am
This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation. Published by: ComputerWeekly.com

Computer Weekly – 21 November 2017: What can intent-based networking do for you?

Security News White Papers - Fri, 11/24/2017 - 12:00am
In this week's Computer Weekly, intent-based networking promises to optimise networks through automation and analytics, but can it deliver? Gartner says the CIO role continues to evolve and IT leaders need to champion digital change – we examine the issues. And we find out how security analytics can help deal with cyber threats. Read the issue now. Published by: ComputerWeekly.com

Essential Guide: Securing hybrid IT infrastructure

Security News White Papers - Thu, 11/23/2017 - 12:00am
In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud. Published by: ComputerWeekly.com

Introducing the Delphix Dynamic Data Platform

Security News White Papers - Wed, 11/22/2017 - 12:00am
In this webcast, hear from Patrick Lightbody of Delphix, about the need to rethink the approach to data management and access to data, which will require significant changes among people and processes. Published by: Delphix

EU General Data Protection Regulation with MarkLogic

Security News White Papers - Wed, 11/22/2017 - 12:00am
This webcast covers the importance of understanding the GDPR, and the steps to take to achieve and manage compliance, with the use of a database that integrates data better, faster, with less cost. Listen in to learn about the steps your organization should take to ensure compliance, and how you stay on top of the process along the way. Published by: MarkLogic

CIOs Discuss Digital Transformation

Security News White Papers - Wed, 11/22/2017 - 12:00am
This webcast outlines the top challenges CIOs face to meet their technology and business needs. Learn more about what CIOs from top companies discovered about their businesses and their hesitations with digital transformation. Published by: Delphix

Step Up Your Security and Privacy with Data Masking

Security News White Papers - Wed, 11/22/2017 - 12:00am
With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is no longer an easy task with mandates like the new GDPR or HIPAA. Companies must focus on proactively protecting the sensitive information - that's where data masking comes in. Published by: Delphix

How can organizations get control over privileged identity management?

Security News White Papers - Tue, 11/21/2017 - 12:00am
Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information Published by: One Identity

How Can Privileged Access Accounts Be Managed in Large Companies?

Security News White Papers - Mon, 11/20/2017 - 12:00am
According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access. Published by: One Identity

CW ASEAN Nov 2017

Security News White Papers - Fri, 11/17/2017 - 12:00am
In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of. Published by: ComputerWeekly.com

CW ANZ Nov 2017

Security News White Papers - Fri, 11/17/2017 - 12:00am
In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security. Published by: ComputerWeekly.com

Fintech & the digital customer experience

Security News White Papers - Thu, 11/16/2017 - 12:00am
In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years. Published by: ComputerWeekly.com

Choosing the right DRaaS provider

Security News White Papers - Thu, 11/09/2017 - 11:00pm
'Storage' magazine examines how to screen disaster recovery-as-a-service providers, as well as evolving cold data storage and file sync-and-share offerings. Published by: SearchStorage.com

CW Benelux November 2017

Security News White Papers - Thu, 11/09/2017 - 11:00pm
The Netherlands is seen as a pioneering country which often takes different approaches to solving problems.It is a small country with limited resources and often finds itself using innovative methods to keep up. Published by: ComputerWeekly.com

Payer's Place in the Healthcare Ecosystem Keys to Success

Security News White Papers - Wed, 11/08/2017 - 11:00pm
HealthEdge in partnership with HLTH, hosted a webinar to discuss the modernization and transformation of healthcare payer administration and operational infrastructure. Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value. Published by: HealthEdge

Real- World Examples: ROI- Results

Security News White Papers - Wed, 11/08/2017 - 11:00pm
Learn more about how payers used HealthRules with real-world examples of some of the changes that occurred at their organizations. Published by: HealthEdge

The Case for Modern SOCs

Security News White Papers - Wed, 11/08/2017 - 11:00pm
In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more. Published by: SearchSecurity.com

Pages