Identity Management (Security) Reports

How long does it take to get owned?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
Posted: 08 Feb 2021 | Published: 23 Apr 2019

TechTarget ComputerWeekly.com

Computer Weekly – 12 December 2023: Shaping the modern workplace
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how the shift to cloud services and the need to deal with a hybrid workforce have changed modern IT. The emerging area of computational storage promises performance boosts for demanding workloads – we look at the challenges. And we find out how Zoom plans to exploit GenAI. Read the issue now.
Posted: 11 Dec 2023 | Published: 12 Dec 2023

TechTarget ComputerWeekly.com

Computer Weekly – 10 July 2018: Tackling the digital identity problem
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Jul 2018

TechTarget ComputerWeekly.com

Provide Secure Remote Access And Gain Peace Of Mind With Palo Alto Networks Prisma Access
sponsored by Palo Alto Networks
ANALYST REPORT: As more apps, servers & services are delivered from the cloud, organizations are reevaluating whether legacy point solutions can adequately scale & provide secure, reliable access for their users & locations. Security is being stepped up in response. Read this Forrester report to explore the value of Palo Alto Networks Prisma Access.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Palo Alto Networks

Computer Weekly – 16 May 2017: Political turmoil threatens global IT services sector
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 May 2017

TechTarget ComputerWeekly.com

Identity and Access Management (IAM) 101
sponsored by Beta Systems
EGUIDE: Identity and access management (IAM) is critical for provisioning (or restricting) user access to certain data, applications and networks – but how exactly does IAM work? And what steps can be put in place to ensure its effectiveness? Read this exclusive e-guide to find out.
Posted: 02 Aug 2022 | Published: 29 Jul 2022

Beta Systems

Time for an IAM Overhaul
sponsored by TechTarget Security
EBOOK: IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

TechTarget Security

Top Mobile Security Threats IT Needs to Know About
sponsored by BlackBerry
EGUIDE: In an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

TechTarget ComputerWeekly.com

The State of Cybersecurity and How It Will Evolve
sponsored by ALTR
EGUIDE: Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
Posted: 19 Feb 2019 | Published: 15 Feb 2019

ALTR