Latest
Ver.ID Secures USD 2.05 M to Help Euro Firms Adhere to eIDAS 2.0
Fortinet's FortiGuard Labs Uncovers Two Malicious Python Packages
Keepit Secures USD 50M in its Latest Funding Round
Arctic Wolf Acquires Cylance of BlackBerry for USD 160M
Sublime Security Nabs USD 60 M for its Platform and Community
Sublime Security Nabs USD 60 M for its Platform and Community
Sublime Security Nabs USD 60 M for its Platform and Community
Sublime Security Nabs USD 60 M for its Platform and Community
Sublime Security Nabs USD 60 M for its Platform and Community
Ayar Labs Raises $155M to Transform AI Workloads with Light
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
2024 state of application strategy report...
datos – api security solution evaluation guide...
challenges in application security (and why your o...
ai pcs are quickly becoming the key to achieving s...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
the vancouver canucks score a cybersecurity hat tr...
cyber insurance and cyber defenses 2024: lessons f...
how to run a cybersecurity tabletop exercise...
unpatched vulnerabilities: the most brutal ransomw...
du rôle du stockage pour relever les défis de la...
il ruolo dello storage per garantire la resilienza...
state of the european security and privacy markets...
ランサムウェア対策の 7 つのベスト�...
cyber snapshot, issue 7 - five hot topics in cyber...
veeam's ai security: zero trust demos...
api 보안 ebook...
All
Security
mitigating credential harvesting with advanced sec...
purchase cyber insurance: why it’s essential for...
how to reduce the risk of ransomware? a detailed g...
data tokenization transforming protection and comp...
customer identity access management: build trust ...
application protection management in a digital era...
continuous data protection strengthening business ...
cloud encryption fortifies digital frontier for en...
grid computing harness distributed resources for s...
enhancing cyber resilience: a strategic approach t...
advanced encryption standard: pillar for modern da...
secure sensitive data with privileged access manag...
modernizing secops in enterprises: a comprehensive...
explore 5 tactics to enhance innovation at the edg...
advanced api security: why gateways alone aren't e...
intrusion detection system: the cornerstone of net...
single-vendor sase: key use cases to consider befo...
why are targeted ransomware attacks so successful?...
why threat hunting cyber security is today’s nee...
dynamic application security testing for technical...
All
Security
ver.id secures usd 2.05 m to help euro firms adher...
fortinet's fortiguard labs uncovers two malicious ...
keepit secures usd 50m in its latest funding round...
arctic wolf acquires cylance of blackberry for usd...
sublime security nabs usd 60 m for its platform an...
sublime security nabs usd 60 m for its platform an...
sublime security nabs usd 60 m for its platform an...
sublime security nabs usd 60 m for its platform an...
sublime security nabs usd 60 m for its platform an...
ayar labs raises $155m to transform ai workloads w...
citrix acquires strong network and devicetrust for...
citrix acquires strong network and devicetrust for...
vaultree open-sourced its data encryption technolo...
aws is widening its cybersecurity portfolio to com...
aws is widening its cybersecurity portfolio to com...
aws is widening its cybersecurity portfolio to com...
n-able acquires adlumin to expand cybersecurity po...
halcyon secures usd 100 m to combat ransomware...
wiz acquires dazz, a cybersecurity startup for a w...
wiz acquires dazz, a cybersecurity startup for a w...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
All Whitepapers
Whitepapers
--Whitepapers Category--
Security
embedded application security y-word (easy)
Sponsored by:
Cypress
Published By: Research Desk
Released: May 19, 2023
Application security is hard. It's hard to find security experts for your team, and once you get them it's hard to keep them. There are so many commercial and open source tools available, how do you c...
Read more
protecting financial services from ransomware attacks
Sponsored by:
Vmware
Published By: Research Desk
Released: May 15, 2023
Ransomware attackers are notoriously opportunistic. According to the VMware Carbon Black 2021 Cybersecurity Outlook survey, 66 percent of security teams and IT professionals reported being targeted by...
Read more
putting trust in zero trust:
Sponsored by:
Jamf
Published By: Research Desk
Released: May 15, 2023
Unfortunately, in the past, heightened security requirements often meant a heavy burden on employees, forcing them to go through extra steps to gain access - not anymore. With Okta Identity Cloud a...
Read more
identity management and security
Sponsored by:
Jamf
Published By: Research Desk
Released: May 15, 2023
The importance of identity management has become abundantly clear in the past decade as organizations looked to accommodate remote workforce demands. A migration from on-premises to the cloud has take...
Read more
trusted access: modern management and security
Sponsored by:
Jamf
Published By: Research Desk
Released: May 15, 2023
Trusted Access is the unique outcome of bringing together Jamf device management, user identity and secure connectivity with endpoint protection. It allows organizations to deliver a hybrid work exper...
Read more
the guide to securing digital identities and minimizing risk in the enterprise
Sponsored by:
SailPoint
Published By: Research Desk
Released: May 01, 2023
According to the experts at Control Risks, Cyber Risk is a top 5 risk for 20231 , and deservedly so. The ongoing operations anywhere and digital transformation shifts have exposed security weaknesses ...
Read more
horizons of identity security
Sponsored by:
SailPoint
Published By: Research Desk
Released: May 01, 2023
Every human, bot and machine now needs a digital identity to navigate the world of rapidly evolving technologies including the metaverse, decentralized finance, crypto and Web 3.0. Business leaders ac...
Read more
delivering software securely
Sponsored by:
Google
Published By: Research Desk
Released: Apr 24, 2023
The last few years have seen a slew of security breaches classified as “software supply chain” attacks. In this whitepaper, you will learn about industry standards leading to best practices and Go...
Read more
2022 state of devops (dora)
Sponsored by:
Google
Published By: Research Desk
Released: Apr 23, 2023
For the last eight years, Google Cloud has produced the State of DevOps report, hearing from over 33,000 professionals worldwide. Here are outlined the DevOps practices that drive successful softwa...
Read more
microsoft security mastery: closing the gap to zero trust
Sponsored by:
Macquarie
Published By: Research Desk
Released: Apr 19, 2023
Join Macquarie Cloud Services, the leading Microsoft Security Specialist, for an interactive virtual session hosted by Naran McClung, Head of Azure, and Josh Dominguez, Security Operations Analyst, on...
Read more
Posts navigation
Prev
1
…
17
18
19
20
21
22
23
…
191
Next
Whitepapers
News
Insights
Security
Security
Security
We use cookies to ensure we give you the best experience on our website. We strongly encourage you to read our updated
Privacy Policy
Agree