Searching all of TechTarget| 31,607 results for "critical"

Conversations: How critical are your applications?

See all conversation search results provided by ITKE.

ComputerWeekly

Oct 27, 2014

Securing critical industrial systems

In this week’s Computer Weekly, we examine the security threats to the industrial control systems that power the UK’s critical national infrastructure, and ask what can be done to better protect them. We look at ... Continue Reading

SearchSOA

By Tom Nolle Evaluate Dec 30, 2014

API security more critical as componentization grows

Securing APIs is critical as componentization grows. Expert Tom Nolle suggests that an API's security attributes are as important as functional attributes. Continue Reading

SearchDataBackup

By Jason Buffington Evaluate Feb 18, 2015

Tape still critical in any data archiving strategy

Jason Buffington of Enterprise Strategy Group explains why the rumors of tape's demise, which is unlikely to happen soon, are greatly exaggerated. Continue Reading

ComputerWeekly

By Warwick Ashford Feb 17, 2015

Identity critical to IoT, says Gartner

Managing identities and access is critical to the success of the internet of things but this will be challenging, says Gartner Continue Reading

SearchCloudSecurity

By Dejan Lukan Get Started Dec 02, 2014

Addressing the most critical cloud security threats

There are many security threats in cloud computing, but it's important for enterprises to understand at least the top risks. Expert Dejan Lukan reviews what to be aware of before migrating to the cloud. Continue Reading

SearchSecurity

By Eric Cole Get Started Jan 19, 2015

Mini risk assessments: Simplifying protection of critical assets

Expert Eric Cole explains how his simplified, risk-based approach to security will help enterprises better identify -- and prevent -- the most dangerous threats. Continue Reading

ComputerWeekly

By Warwick Ashford Dec 03, 2014

Report warns of Iranian critical infrastructure compromises

Iranian hackers have compromised critical infrastructure and other networks containing confidential data in 16 countries, a research report warns Continue Reading

SearchSecurity

By Michael Heller News Jan 27, 2015

Qualys finds GHOST: Critical Linux remote code execution flaw

A critical Linux vulnerability, called GHOST, has been found to affect glibc versions released since 2000, and could pose a remote exploit risk on many Linux systems. Continue Reading

ComputerWeekly

By Warwick Ashford Jan 26, 2015

Critical infrastructure executives complacent about IoT security, study shows

A survey reveals there is little concern about the security of energy firms' devices on the internet of things (IoT) despite the risks Continue Reading

SearchStorage

By Jon Toigo Evaluate May 01, 2014

The critical role of archiving systems

Archiving data is more important than ever; it ensures proper data retention, saves space and eases the backup burden. Continue Reading