Loss Management Reports

CW Innovation Awards: SIA taps blockchain for loyalty app
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
Posted: 11 May 2021 | Published: 11 May 2021

TechTarget ComputerWeekly.com

CW ANZ, July 2020: Expert Advice on Security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Royal Holloway: Driverless vehicle security for military applications
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 08 Feb 2021 | Published: 19 Mar 2020

TechTarget ComputerWeekly.com

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage

How to Make a SIEM System Comparison Before you Buy
sponsored by TechTarget Security
EBOOK: Considering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

TechTarget Security