• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
flow-image
F5 Networks

Office of the CTO Report: Continuous API Sprawl

APIs are a contract between the service provider and service consumer. When any application uses an API, it needs to conform to an agreed-upon standard, with implicitly set expectations. What happens behind the scenes is of no concern to the consumer, enabling the service provider to use whatever means necessary to deliver...

Published: May 23, 2022
View More
flow-image
F5 Networks

API Security Best Practices

Application Programming Interfaces, or APIs, were developed to streamline the way digital ecosystems communicate and interact with each other. At their core, APIs abstract the complexity of connecting multiple disparate systems. This allows developers to integrate third-party content or services quickly and easily into...

Published: May 23, 2022
View More
flow-image
ServiceNow

Create continuity plans that minimize disruptions and protect critical assets​

Discover how to make creating an effective BCM plan simple, by moving business continuity and disaster recovery onto a single platform.​​

Published: Apr 04, 2022
View More
flow-image
ServiceNow

Activate ESG Use Case Guide

Incorporating robust ESG practices into business strategy and execution is critical, not only to be a good corporate citizen and ensure regulatory compliance, but also to drive and maintain customer, investor, and employee loyalty. Through technology and a consumer-grade user experience, ServiceNow® embeds ESG concepts...

Published: Apr 04, 2022
View More
flow-image
Informatica

Six Steps to Intelligent Data Privacy

Explosive data growth is a double-edged sword. On one hand, it’s enabling the most disruptive and exciting companies in the world to create competitive advantages and develop brand new products and services. On the other, you have to deal with more sensitive data exposure and misuse than ever before. Governing this...

Published: Feb 08, 2022
View More
flow-image
ServiceNow

Leadership trends report: operating excellence

Optimising business operations used to mean just lowering costs and increasing profits. But today, you also need to drive value while facing emerging technologies, cyber security and risk, and environmental and social issues. Read this 2022 Trends Report to learn how you can power constant innovation and achieve true operational...

Published: Apr 04, 2022
View More
flow-image
Informatica

Six Steps to Intelligent Data Privacy

Explosive data growth is a double-edged sword. On one hand, it’s enabling the most disruptive and exciting companies in the world to create competitive advantages and develop brand new products and services. On the other, you have to deal with more sensitive data exposure and misuse than ever before. Governing this...

Published: Feb 08, 2022
View More
flow-image
Symantec Corporation

Enhancing Website Security with Algorithm Agility

This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.

View More
flow-image
Proofpoint

2021 State of the Phish

There’s no question that organisations (and individuals) faced many challenges in 2020, both new and familiar. Information security teams felt the strain, too. On top of “ordinary” cybersecurity issues, professionals in these roles dealt with an explosion of pandemic-themed phishing scams and a continued...

Published: Apr 21, 2021
View More
flow-image
GeoTrust

Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams

In this guide, you’ll learn more about phishing, why it has become such a widespread problem, and the negative impact that a phishing attack can have on your company and your customers. You’ll also learn how SSL and EV SSL technology can help protect your web site, your business, and ultimately your bottom...

View More
flow-image
SafeNet

Delivering High-Assurance Payment Applications that are Compliant with the Point-to-Point Encryption Standard

For service providers that are looking to build or adapt offerings to align with P2PE standards, this paper provides insights for selecting the right hardware security module (HSM), outlining some of the fundamental requirements to look for in evaluating various alternatives.

View More
flow-image
Proofpoint

Ponemon Cost of Insider Threats Global Report

Independently conducted by Ponemon Institute External attackers aren’t the only threats modern organisations need to consider in their cybersecurity planning. Malicious, negligent, and compromised users are a serious and growing risk. As the 2022 Cost of Insider Threats: Global Report reveals, insider threat...

Published: Apr 06, 2022
View More
flow-image
Arbor Networks

Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market...

This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, -- and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attacks and the potential for...

View More
flow-image
Palo Alto Networks

10 Things Your Next Firewall Must Do

Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application...

View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon