Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • 2024 IT Salary Survey Results
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

Gary McGraw

  • McGraw: Seven myths of software security best practices

    According to expert Gary McGraw, you're not helping yourself by believing the things -- all seven of them -- you've heard about secure software development.  Continue Reading

    Gary McGraw
    By
    • Gary McGraw, Synopsys
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • The demands of AI on network as a service

    An expert panel at ONUG's AI Networking Summit Spring 2025 gave insight into the future of AI in networking, particularly in NaaS...

  • Agentic AI for networking: Catalyst or distraction?

    Though many networking platforms claim to be agentic, few truly are. Here's how to determine whether a platform is agentic and ...

  • Overview of the AI maturity model in networking

    A network maturity model outlines the path from manual to automated operations. As organizations move to AI-ready networks, ...

Search CIO
  • FTC sends message with Synopsys, Ansys divestiture order

    To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants the two companies to divest ...

  • UK backdoor order to Apple raises bipartisan concerns

    U.S. officials fear that gaps in existing law may enable countries to target U.S. companies with data access requests that harm ...

  • What is vendor risk management (VRM)? A guide for businesses

    Vendor risk management identifies, assesses and mitigates risks from third-party vendors to protect companies from data breaches,...

Search Enterprise Desktop
  • How to navigate the Windows Hello for Business requirements

    While Windows Hello is easy to set up on the user level, Windows Hello for Business needs a bit more back-end legwork to meet the...

  • Comparing Windows Hello vs. Windows Hello for Business

    Windows Hello allows desktop admins to manage local Windows authentication with new tools, but the difference between the free ...

  • With shadow AI, sometimes the cure is worse than the disease

    Organizations need to implement policies and restrictions around AI productivity tools, but they also need to make sure the ...

Search Cloud Computing
  • 8 benefits of AI as a service

    Some businesses lack the resources to build and train their own AI models. Can AIaaS level the playing field for smaller ...

  • Examine the 4 types of edge computing, with examples

    Edge computing is popular, but it's not going to benefit every IoT device or workload. Look at the various types of edge ...

  • Get started with Amazon Q Developer

    Amazon Q Developer is a versatile tool for software development, offering code generation, optimization recommendations and ...

ComputerWeekly.com
  • Nokia takes the helm of Proactif to deliver ‘state-of-the-art’ UxV platforms

    Comms tech provider selected to lead major project backed by initiative aiming to redefine how Europe uses robotics and unmanned ...

  • Labour commits £17.2m to support Spärck AI scholarships

    The government has put up money to help drive the UK’s expertise in artificial intelligence

  • Are we normalising surveillance in schools?

    Children and teenagers are subjected to a vast array of surveillance technologies in schools. These are intended to keep them ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

All Rights Reserved, Copyright 2000 - 2025, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close