• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
flow-image
Carbon Black

Top 5 Threat Hunting Myths

There are plenty of myths out there preventing security professionals from getting proactive with threat hunting. Carbon Black try and set the record straight in this e-book. Download now to find out more!

View More
flow-image
Citrix

Realize your Cloud's Potential

Cloud is rapidly changing the ways we work — and the rate at which work will continue to change is only going to increase. To get the full business benefits of the cloud, your organization needs an agile infrastructure that allows people to securely connect to the data they need, and has the flexibility to adapt...

View More
flow-image
Proofpoint

A Guide to Setting Up Your Insider Threat Management Programme

Insider threats are one of the fastest growing categories of risk across organisations today. Companies have long been aware of the insider threat problem. But few are dedicating the resources or executive attention they need to actually reduce their risk. Others may be ready to make that commitment but just don’t...

Published: Dec 21, 2021
View More
flow-image
Proofpoint

The Anatomy of an Insider Threat Investigation

For decades, perimeter-based security strategies have been the starting point for most cybersecurity programs. But in today’s cloud-based, mobile and remote work setting, that perimeter has all but dissolved. Learn how Proofpoint Insider Threat Management can help make your investigations more efficient, detailed...

Published: Dec 21, 2021
View More
flow-image
Sophos

Simple Security is Better Security

In this paper we’ll examine the inherent complexity of enterpriseclass security products and the very different needs of smaller organizations. Then we’ll look at a simpler alternative: cloudbased endpoint security.

View More
flow-image
Carbon Black

Building the Business Case for Improving Endpoint Security

As a security provider, we understand that convincing executives to make changes to their stack can be difficult. It’s important to clearly demonstrate return on investment (ROI) for any security build out, so that your team becomes more effective with every dollar committed.  It’s important that...

View More
flow-image
McAfee

SPF, DKIM, and DMARC Demystified: The what, why, and how of email sender identity technologies

Enterprise sender identity technologies—SPF, DKIM, and DMARC—when properly implemented and incorporated into your email security strategy, can go a long way toward securing email, your most valuable business communication tool. Phishing and spear-phishing not only trick your employees, your partners, and...

View More
flow-image
Symantec

Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

This whitepaper first discusses what to look for in a virtualization protection solution and then considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Near the back of this document...

View More
flow-image
Sophos

Five Stages of a Web Malware Attack

Today’s web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This paper shows you how modern web attacks work, broken down into five stages, from entry through execution. 

View More
flow-image
Symantec

Symantec Intelligence Report: August

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.

View More
flow-image
ESET

Six Months with Windows® 8

Microsoft® Windows 8 has just reached its six-month anniversary 1 , and we at ESET® thought now would be a good time to review where things stand with the latest incarnation of Microsoft’s flagship operating system. Last year, ESET took an in-depth look at Windows 8’s security, examining many of...

View More
flow-image
Kaspersky

Your Data under Siege: Defeating the Enemy of Complexity

There are three important truths in today’s cyberlandscape: First, your company is the custodian of valuable, confidential data, applications and IT infrastructure that drive nearly half of all economic activity. Second, all companies face the same security threats. And third, you are challenged...

View More
flow-image
Akamai

Is DNS Your Security Achilles Heel?

Despite the many layers of security most companies implement, there is still one vulnerability that is often left unprotected: the Domain Name System or DNS. This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you...

View More
flow-image
McAfee

Doing Battle with Advanced Malware

Discover how enterprises are tackling a new generation of insidious and potentially costly threats.

View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon