User ID Management Reports

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

Computer Weekly – 10 July 2018: Tackling the digital identity problem
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Jul 2018

TechTarget ComputerWeekly.com

IAM: Managing identity remains key to cyber security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 08 Feb 2021 | Published: 29 Aug 2019

TechTarget ComputerWeekly.com

The Total Economic Impact™ Of Palo Alto Networks Prisma SASE
sponsored by Palo Alto Networks
FORRESTER TOTAL ECONOMIC IMPACT REPORT: Forrester does the heavy lifting for you in this Total Economic Impact report, analyzing the benefits, cost, and financial impact of Palo Alto Networks Prisma SASE from a third-party, neutral perspective. Access the report to view Forrester’s analysis.
Posted: 03 May 2024 | Published: 03 May 2024

Palo Alto Networks

How long does it take to get owned?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
Posted: 08 Feb 2021 | Published: 23 Apr 2019

TechTarget ComputerWeekly.com

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Third-Party Risk Management: How to Avoid the Dangers of Weak Controls
sponsored by ModoModo
EGUIDE: If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.
Posted: 23 Feb 2017 | Published: 17 Feb 2017

ModoModo

Digital Identities: Account Creation & Blockchain Implications
sponsored by Beta Systems
EGUIDE: Digital identities have become a critical aspect of modern digital business. However, ensuring each account is secure and has access to appropriate data and applications can be complicated. Read this e-guide to learn about digital identity account creation and the potential impacts of disruptive technologies, like Blockchain.
Posted: 02 Aug 2022 | Published: 02 Aug 2022

Beta Systems

What are Threat Intelligence Services?
sponsored by Unisys
EGUIDE: To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.
Posted: 13 Oct 2016 | Published: 12 Oct 2016

Unisys