Control Internet Access Reports

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

IoT & the Enterprise: Exploring Opportunities and Challenges in Asia
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.
Posted: 08 Feb 2021 | Published: 26 Jun 2017

TechTarget ComputerWeekly.com

CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
sponsored by TechTarget ComputerWeekly.com
EZINE: Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
Posted: 08 Feb 2021 | Published: 27 Feb 2020

TechTarget ComputerWeekly.com

CW Middle East Jan to Mar 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
Posted: 08 Feb 2021 | Published: 11 Jan 2018

TechTarget ComputerWeekly.com

Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

NB-IoT: 3 Use Cases and Challenges
sponsored by T-Mobile for Business
EGUIDE: Narrowband and IoT combined can bring out the best parts of both technologies in smart cities, asset tracking and agricultural projects, but NB-IoT use cases have disadvantages. In this e-guide learn more about these use cases and challenges.
Posted: 04 May 2020 | Published: 04 May 2020

T-Mobile for Business

How to prevent cross-site scripting attacks: Expert tactics
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

TechTarget Security

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by TechTarget Security
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Security

The Tangled Web of Data Privacy Issues
sponsored by Thawte Inc.
EGUIDE: In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

Thawte Inc.