Infosecurity Reports

5 cybersecurity myths and how to address them
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Build your Content Security and Document Management Plan
sponsored by Adobe
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Ransomware Backup Protection Requires Comprehensive Approach
sponsored by TechTarget Data Backup
EBOOK: Read on to discover just how ransomware can infiltrate data backups, what organizations can do to best prepare for this new problem and general guidelines for better backup practices.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

TechTarget Data Backup

Modern Retention Enablement
sponsored by IBM
VIDEO: This quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.
Posted: 26 Jul 2013 | Premiered: 25 Jun 2012

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Making the Most of BYOD Opportunities
sponsored by Dell and VMware
WHITE PAPER: Access this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity.
Posted: 11 Nov 2013 | Published: 30 Apr 2013

Dell and VMware

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast