Control Internet Access Reports

CW ASEAN: SD-WAN helps find best route to cloud
sponsored by TechTarget ComputerWeekly.com
EZINE: This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.
Posted: 08 Feb 2021 | Published: 12 Apr 2018

TechTarget ComputerWeekly.com

Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

Computer Weekly – 14 January 2020: Building the internet of the future
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Cisco unveils the $5bn platform that it believes will be the future of the internet – we look through the details. The McLaren Formula One team discusses how IoT and data analytics have been key to its revival on the track. And we examine the importance of diversity in software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 14 Jan 2020

TechTarget ComputerWeekly.com

DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE: In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

Radware

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.
Posted: 08 Jun 2012 | Published: 08 Jun 2012

Symantec Corporation

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by TechTarget Security
EGUIDE: This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

TechTarget Security

Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY: In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs
sponsored by Dell SonicWALL
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by TechTarget Security
EGUIDE: Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

TechTarget Security