• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
  • /
  • Data Loss Prevention (DLP)
flow-image
Fortinet

Seven Major Challenges Impeding Digital Acceleration

In today’s digital marketplace, speed and availability are essential. Organizations turned to digital innovation to remain competitive, trading their legacy systems for hybrid networks and digital processes, including cloud and business application adoption. The success of this transition, both in terms of customer...

Published: May 04, 2022
View More
flow-image
Varonis

5 Remote Work Threats and How to Protect Against Them

With the surge in remote work, many IT and security teams are forced to make security tradeoffs to maintain business continuity. The numbers of internet-facing RDP servers and VPN devices have both grown very quickly, and Microsoft Teams usage has exploded. Whether it’s relaxing security policies so that...

Published: May 26, 2022
View More
flow-image
Vectra Al

Stopping Ransomware: Dispatches from the Frontlines

No organization wants to discover a ransomware attack unfolding in their environment, but if you can quickly identify the signals — you’ll have the best chance possible to stop it.  This ebook dives into everything from why detecting attacker activity and recon known as ransomOps...

Published: May 26, 2022
View More
flow-image
Dragos

Executive Summary: ICS/OT Cybersecurity 2021 Year in Review

In 2021, the industrial community attracted high-profile attention. Major cybersecurity incidents struck industrial organizations in a range of sectors, with international headlines detailing everything from a compromise of a water treatment facility with intent to poison its community to a ransomware attack against...

Published: Apr 27, 2022
View More
flow-image
Nasuni

Combatting Ransomware by Exposing the Myths

Ransomware continues to pose a credible and costly threat to the enterprise. Misinformation only compounds the problem. Today, several ransomware-related myths remain prevalent. These could prevent organizations from developing solid defense strategies and recovery plans. In this e-book, Brien M. Posey, technology...

Published: May 13, 2022
View More
flow-image
Fortinet

The Threat That Never Goes Away

While digital acceleration and work-from-anywhere strategies may have been driven by the uncertain times brought about by the global pandemic, they remain essential for any organization competing in today’s digital marketplace. However, that network transformation has also expanded the attack surface organizations...

Published: May 04, 2022
View More
flow-image
Dragos

Report: ICS/OT Cybersecurity 2021 Year in Review

Dragos is excited to present the fifth year of the annual Dragos Year In Review report on Industrial Control System (ICS)/ Operational Technology (OT) cyber threats, vulnerabilities, assessments, and incident response observations. The ICS/ OT community has long suffered from more anecdotes on security than insights...

Published: Apr 27, 2022
View More
flow-image
Webroot

Multi-Vector Protection

Educating users is an undeniably effective way to protect them from phishing and other malware, but it takes much more than that to stop attacks. There are many risks to networks that user education can’t reduce—from malicious sites mistakenly categorized as benign to watering-hole attacks that infect trusted...

Published: May 20, 2022
View More
flow-image
Webroot

5 Benefits of Partnering with Webroot

While cyberattacks continue to evolve in volume, organization, and sophistication, security technology is moving rapidly toward automated intelligence and decision-making. But many organizations are overwhelmed by the number of security alerts they receive, and do not have the inhouse resources to handle them. Webroot...

Published: May 20, 2022
View More
flow-image
Rockwell Automation

Cybersecurity Assessments: How to Achieve Your Target Security Posture

Every company’s journey to become more secure is unique. The factors that may impact your target security profile include operating risk, unique operating workflows, policies, procedures, risk tolerance, and more. Unfortunately, it is impossible to become 100-percent risk free. The goal should be to establish...

Published: Apr 13, 2022
View More
flow-image
ServiceNow

AIOps & Visibility For Dummies, ServiceNow Special Edition

From gaining visibility and agility through automation, to delivering business service health and reducing complexity, AIOps can help you and your team overcome IT challenges and start reaping the benefits your organization wants. To help you get started on this journey, download AIOps & Visibility For Dummies,...

Published: No Date
View More
flow-image
Fortinet

Top Strategic Technology Trends for 2022: Cybersecurity Mesh

The rapid evolution and sophistication of cyberattacks and the migration of assets to the hybrid multicloud creates a perfect storm. IT leaders must integrate security tools into a cooperative ecosystem using a composable and scalable cybersecurity mesh architecture approach.

Published: May 04, 2022
View More
flow-image
NEUSTAR SECURITY

DDoS Disruption Impacts and the Need for Always-On Security

While details are murky in terms of what recovery from Covid-19 will look like, one thing is abundantly clear for enterprises around the world: the importance of expanding and securing their digital business footprint. Covid has driven companies to increase remote work and collaboration capabilities, migrate more assets...

Published: Mar 24, 2022
View More
flow-image
Aruba

Ponemon Report

Ponemon surveyed 1,826 IT professionals globally to understand the state of SD-WAN, SASE and Zero Trust architectures. Here’s what they found.

Published: May 24, 2022
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon