Joke Programs Reports

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Focus ASEAN: Security & Digital Transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

Physical vs. Virtual Desktop Security: It's Just Not The Same
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Is the Endpoint Security Nightmare Ending?
sponsored by TechTarget Security
EBOOK: In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

TechTarget Security

Do You Need Malware Protection on a VDI Thin Client?
sponsored by Dell, Microsoft and Citrix
EGUIDE: There are plenty of options for VDI thin client devices out there, and most are safe to use without antimalware software. But there are some thin client models that should have added malware protection. Learn which thin client needs extra protection and why.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Dell, Microsoft and Citrix

How the Basics of Network Security Have Evolved
sponsored by Fortinet, Inc.
EGUIDE: In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
Posted: 09 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

Getting Ahead of Cyber Threats in 2017
sponsored by TechTarget Security
EZINE: In this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.
Posted: 01 Feb 2017 | Published: 01 Feb 2017

TechTarget Security

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

TechTarget ComputerWeekly.com