• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email
flow-image
Veritas

Defend Against Ransomware

Defend your organization from evolving ransomware attacks. Learn what it takes to reduce risk and strengthen operational resiliency.

Published: Dec 22, 2020
View More
flow-image
Imperva

The Anatomy of Account Takeover Attacks

Bad bots are on every website with a login page. Even yours. Hackers and fraudsters use bots to validate sets of login credentials, gain access to credit card data, and sell personally identifiable information on the dark web. They also use stolen account data to transfer money, purchase goods, or spread a specific...

Published: Feb 08, 2021
View More
flow-image
Adobe

Engaging the new digital workforce: A blueprint.

With many employees now working remotely and many others working on-site but at a physical distance, you may have found that your company needs a digital communication reboot. When those who were temporarily remote return, the workplace will not be the same as when they left. Physical distancing and virtual collaboration...

Published: Feb 17, 2021
View More
flow-image
Okta

Build vs. Buy: Roll your own auth vs. embed a pre-built identity layer into your app

Every team building a new web or mobile application faces a choice: build the entire application in-house or selectively use out-of-the-box services to make the job easier and faster. Many of today’s successful teams have chosen the latter with services like Stripe and Braintree to offload payments and Twilio to...

Published: Feb 05, 2021
View More
flow-image
Malwarebytes

2021 State of Malware Report

The story of 2020 is of the devastating COVID-19 pandemic, and of how the world adapted. The story of malware in 2020 then, is a story of how the tools and tactics of cybercrime and cybersecurity changed against a backdrop of enormous changes to ordinary life. As entire businesses switched to remote working, IT teams...

Published: Feb 24, 2021
View More
flow-image
Xerox

The Future Is Flexible: Six Areas to Make It Work.

Over 50% of businesses are preparing for long-term, flexible work patterns. But the rush to adopt remote technology and maintain service levels has left businesses unable to secure operational resilience. This Xerox guide explores how cloud infrastructure, security, automation, and managed support can futureproof...

Published: Feb 24, 2021
View More
flow-image
Imperva

15 Ways Your Website is Under Attack

Web applications are the home of your business on the internet. The functionality within your website, the structure of your technology stack, and the code used to build it are under constant attack from bad actors attempting to compromise your business. Understanding these types of attacks will help you prevent fraud,...

Published: Feb 08, 2021
View More
flow-image
Okta

IDaaS for Dummies

This book consists of five chapters that explore:  The importance of identity, what it is, and how it has evolved (Chapter 1)  What modern identity (Identity as a Service) is and how it helps organizations address identity challenges and different use cases (Chapter 2)  The components of...

Published: Feb 05, 2021
View More
flow-image
Egnyte

Centralized Content Access Helps Unify Dispersed Teams

Committing to One Philosophy M&C Saatchi was formed in 1995 by brothers Maurice and Charles Saatchi. It has quickly grown to become the largest independent advertising agency in the world with over 2,000 employees and more than 20 offices spread across the globe including Cape Town, London, New York, Los Angeles, Singapore,...

Published: Feb 02, 2021
View More
flow-image
Malwarebytes

5 Steps to Secure Your Remote Workforce: a Practical Guide

Even before COVID-19, IT and security professionals knew that working remotely was becoming more popular, giving companies access to the best talent and enabling these valued workers to either stay in the places they call home or have the freedom to be digital nomads.  As remote working has become standard practice,...

Published: Feb 04, 2021
View More
flow-image
Behavox

HOW TO (LEGALLY) AVOID PAYING FINES IN THE FINANCIAL SECTOR

There are many different categories, or scenarios, in which financial firms can fall foul of regulatory misconduct. In this white paper, we look at the most common scenarios, detailing some of history’s most heinous examples and revealing how Behavox could have stopped them by catching the true positives in internal...

Published: Feb 03, 2021
View More
flow-image
Okta

Adaptive Multi-Factor Authentication

This white paper provides an overview of Okta Adaptive Multi-factor Authentication (MFA). For security conscious organizations looking to protect applications and data, Okta Adaptive MFA is a comprehensive but simple strong authentication solution that provides policy driven contextual access management, supports a broad...

Published: Feb 05, 2021
View More
flow-image
Okta

Infographic: The Maturity of Zero Trust in Europe.

Zero Trust is driving European organisations to enhance their security solutions. Interested in more data on how your peers are adopting Zero Trust to protect their apps, data and distributed workforce? Download our infographic for more detail on: Where your organisation is on the Identity & Access Maturity...

Published: Feb 05, 2021
View More
flow-image
Egnyte

Managing Sprawl in Microsoft 365

How content sprawl happens, why it matters, and steps every IT leader should take to avoid it. Sprawl happens when anyone and everyone can create a site or team, usually without oversight, planning, or any kind of formal training, resulting in dozens/hundreds of rarely used or abandoned sites and teams, a poorly-performing...

Published: Jan 18, 2021
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x