Security Infrastructure Spending Reports

A guide to build vs. buy service models for threat detection and response
sponsored by AT&T Cybersecurity
WHITE PAPER: Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 08 Feb 2021 | Published: 07 May 2020

AT&T Cybersecurity

Focus: Infosec17
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 08 Feb 2021 | Published: 19 Jun 2017

TechTarget ComputerWeekly.com

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Posted: 28 Jul 2014 | Published: 31 Jan 2013

IBM

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks