• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Latest Whitepapers
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  •  
  •  
flow-image
Aruba

WAN & Security Transformation whitepaper

Successful WAN and security transformation requires examining crucial questions: What’s the role of a secure access service edge (SASE)? How can you manage the risk from mobile and IoT devices? How can you deliver the best possible network experience for customers and employees? Read the business paper for answers....

Published: May 24, 2022
View More
flow-image
Accenture

Why purpose is the #1 thing marketers need—and how to get it

Nearly 70% of marketing executives say that the past year has had their employees feeling completely spent. Part of that comes from the growing pressure for businesses to be all things to all people, all at once. Marketers bear the brunt of this. We’re getting whiplash as we scramble to try every trend, join...

Published: May 20, 2022
View More
flow-image
Avast

What is Malware?

Ever since the birth of computing, people have fought the threat of malware. But what exactly is malware? In this article we define malware, introduce its many different types, and explain how it works. We also describe the warning signs of an infected device and explain how to prevent it with Avast One, our world-class,...

Published: May 26, 2022
View More
flow-image
Avast

The Essential Guide to Computer Viruses

Computer viruses can steal personal information, damage computer performance, and wreak all kinds of other havoc. Read on to learn how viruses work and how to protect yourself against viruses and other dangerous online threats with a comprehensive security solution like Avast One.

Published: May 26, 2022
View More
flow-image
Accenture

Ready or not: why marketing innovation starts with decluttering operations

With digital commerce exploding during the pandemic, we’ve seen ten years of growth in two years, and it’s completely changed the innovation landscape for CMOs. Marketing innovation used to be about developing bespoke loyalty schemes, strategic pricing incentives or cool customization options. Now it’s...

Published: May 20, 2022
View More
flow-image
Workday USA

Create a Modern Software Strategy with AI-Driven Platforms and Their Ecosystems

Learn how your organization can move away from outdated legacy systems and transition to nimble, innovative solutions based on open ecosystems and a microservices-based approach.

Published: May 17, 2022
View More
flow-image
Zimperium

The Increase in Mobile Wallet Adoption Impacts the Need for Security

The use of mobile payments is on the rise! According to industry data, mobile wallets are used by more than two billion people globally, with many millions more adopting mobile payments every year.  In 2021 a total of 25.7% of Point of Sale (POS) payments were performed using mobile wallets and 44.5% of eCommerce...

Published: May 25, 2022
View More
flow-image
Aruba

Edge to cloud webinar

A new WAN edge lets enterprises maximize the value of their cloud and digital investments. Learn how SASE connects users directly to the cloud and safeguards IoT devices that require Zero Trust, identity-based security. It’s all part of the convergence of networking and security. 

Published: May 24, 2022
View More
flow-image
Aruba

Edge to Cloud eBook

 When it comes to security, enterprises must be increasingly agile—especially as the threat landscape continues to evolve. The eBook Edge to Cloud Security: A New WAN and Security Edge serves as a practical guide to adopting a secure access service edge (SASE) in a cloud-first world. For practical guidance...

Published: May 24, 2022
View More
flow-image
Titan HQ

Why Real-Time Security Training is Missing in Your Cyber Security Strategy

You can have the best cybersecurity defenses in place, but attackers can still manage to bypass them from just one human error.  In our blog, we look at 'Phishing as the Number One Threat to Your Business' and consider 'The Importance of Cybersecurity Training'.

Published: May 27, 2022
View More
flow-image
Zscaler

The Three Keys To Transformation Through Zero Trust: Platform, People, and Process

Digital transformation has fundamentally changed the way modern businesses operate. Your employees are on the internet now more than they are on the corporate network, accessing applications and data from everywhere. Sensitive business data has become more distributed, residing outside the corporate perimeter in SaaS applications,...

Published: May 20, 2022
View More
flow-image
ThreatQuotient

Build or Buy? Answering the Eternal Technology Question

The eternal technology question seems to be, “Build or buy?” It is usually posed when a technology capability is mature enough that it has some open source options and there’s a defined market need, but not so mature that an entire discipline exists that has evolved  over many years,...

Published: May 27, 2022
View More
flow-image
Workday USA

Using Technology to Address Challenges in the Staffing of Hourly Frontline Workers in Retail and Hospitality

Retail and hospitality employers face tough competition for frontline workers—but a flexible, employee-friendly scheduling process can help organizations gain a competitive edge. This report from Coresight Research explains the challenges that leaders face in setting schedules, and how a comprehensive, automated...

Published: May 17, 2022
View More
flow-image
Tessian

What is the Cost of a Misdirected Email?

The average number of misdirected emails is almost always higher than IT leaders estimate, making it much more important to understand the consequences of a misdirected email and how to prevent them.  Read the Brief to learn more.

Published: May 27, 2022
View More
flow-image
Tufin

Top Five Micro-segmentation Strategies for Large, Hybrid Enterprises - a Blog

To provide guidance on navigating the micro-segmentation landscape, especially the specific concerns of large, hybrid enterprises, several industry experts came together for a roundtable. In our blog these Industry Experts identify Proven Approaches and Technologies for a Successful Project.

Published: May 27, 2022
View More
flow-image
Vipre

Closing the Door on Cybercriminals: Best Practices for Patch Management

Patch management has become increasingly important because cybercriminals are constantly discovering new vulnerabilities, which forces software vendors to then respond with frequent and irregularly-scheduled patches that remove those vulnerabilities. The more quickly and efficiently you can deploy those patches, the...

Published: May 25, 2022
View More
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon