Control Internet Access Reports

Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

The four rules of complete web protection
sponsored by Sophos
WHITE PAPER: As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos

E-Guide: Next-Gen Firewall vs. the Competition - Which is Better?
sponsored by Dell SonicWALL
EGUIDE: Uncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

Dell SonicWALL

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

September CIO Decisions Ezine: Architecting a Nimble Enterprise
sponsored by TechTarget CIO
EZINE: Agile and lean are the cornerstones of many a successful IT strategy, but what if a CIO works in a sector that hasn't yet embraced the agile enterprise?
Posted: 06 Sep 2013 | Published: 06 Sep 2013

TechTarget CIO

Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

TechTarget Security

Best Practices for Preventing Malware
sponsored by TechTarget Security
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

TechTarget Security

DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE: In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

Radware

How to prevent cross-site scripting attacks: Expert tactics
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

TechTarget Security

How SSL-Encrypted Web Connections are Intercepted
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

TechTarget Security