Security Architecture Reports

A Computer Weekly buyer's guide to supply chain resilience
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.
Posted: 08 Feb 2021 | Published: 06 Nov 2020

TechTarget ComputerWeekly.com

RSA Conference 2020 guide: Highlighting security's human element
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
Posted: 08 Feb 2021 | Published: 04 May 2020

TechTarget ComputerWeekly.com

How to Start Building an Enterprise Application Security Program
sponsored by tCell
EGUIDE: In this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.
Posted: 20 Mar 2017 | Published: 16 Mar 2017

tCell

Top Mobile Security Threats: Insight Into Threats and Attackers
sponsored by Lookout
EGUIDE: Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
Posted: 30 Mar 2017 | Published: 28 Mar 2017

Lookout

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

SIEM Tools, Future Tech and How to Prepare for What's Ahead
sponsored by Sumo Logic AWS
EBOOK: While security tech is evolving, so are the threats. Current IT staffs are feeling overwhelmed and some experts believe AI is the answer. Gartner, however, claims that AI will never be perfect, and SIEM will always need a human touch. In this e-book, look at current SIEM tools, future tech and how to prepare for what’s ahead.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

Sumo Logic AWS

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Five Ways to Secure Mobile Data with EMM
sponsored by Appthority
EGUIDE: This expert e-guide details 5 ways to secure mobile data using enterprise mobility management (EMM) to keep your organization on the cutting edge.
Posted: 14 Feb 2017 | Published: 10 Feb 2017

Appthority

Is Managed Security Monitoring Right for Your Organization?
sponsored by IBM
WHITE PAPER: The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
Posted: 07 Nov 2016 | Published: 25 Jul 2016

IBM