Resources & Whitepapers

Listed below is a selection of technical whitepapers and other advisory notices produced by iTnews' sponsors.

These reports are available free of charge to our subscribers.

Filter by company:

Customer Identity and Access Management for Dummies

Customer Identity and Access Management for Dummies

Secure, seamless digital experiences require modern Customer Identity and Access Management (CIAM). Learn the basics.
Apr 22 2021 12:02PM
Transform your data centre with Oracle Dedicated Region

Transform your data centre with Oracle Dedicated Region

Learn how to gain the advantages of public cloud while meeting data sovereignty, security and latency requirements in your own data centre.
Apr 21 2021 2:35PM
Empowering workforces in the new environment

Empowering workforces in the new environment

Inform your approach to empowering a distributed workforce in the wake of the pandemic.
Apr 19 2021 4:17PM
Is the technology refresh dead?

Is the technology refresh dead?

Learn about by continuous technology renewal in this guide from CHG-MERIDIAN.
Apr 9 2021 2:52PM
DevSecOps: A framework for digital innovation

DevSecOps: A framework for digital innovation

What proportion of Australian organisations are making headway with DevSecOps? This paper shines a light on uptake.
Mar 5 2021 5:35PM
Encryption: Protect your most critical data

Encryption: Protect your most critical data

Learn how encryption can help safeguard your data against threats and address compliance.
Mar 2 2021 8:11PM
Overcoming data security challenges in a hybrid, multicloud world

Overcoming data security challenges in a hybrid, multicloud world

This IBM paper covers key issues to consider when it comes to overcoming data security challenges in a hybrid, multicloud world.
Mar 2 2021 7:26PM
Move beyond passwords

Move beyond passwords

The case for passwordless authentication is compelling, but what are the common approaches organisations can take?
Mar 1 2021 11:03AM
The top 5 tech trends to deliver business outcomes

The top 5 tech trends to deliver business outcomes

IDC predicts that the foundation for using technology to deliver business value will shift from applications to platforms. This paper explains the implications for technology leaders.
Feb 16 2021 10:05AM
10 reasons why businesses need to invest in cloud security training

10 reasons why businesses need to invest in cloud security training

Show you have the technical skills and knowledge to manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures.
Feb 8 2021 2:03PM
Your guide to application security solutions

Your guide to application security solutions

Check if you are covering all bases by reading this Veracode guide to application security solutions.
Jan 29 2021 3:06PM
State of Software Security: Open Source Edition

State of Software Security: Open Source Edition

Understand your development teams' responsibilities in managing open source security risks.
Jan 29 2021 2:59PM
Five questions to ask before you upgrade to a SIEM solution

Five questions to ask before you upgrade to a SIEM solution

How well are you detecting attacks? Learn about key questions to ask before choosing a SIEM, in this IBM eBook.
Jan 21 2021 10:53AM
Effectively addressing advanced threats

Effectively addressing advanced threats

Learn how large, mature organisations are dealing with advanced cyber security threats, in this report by SANS, which was commissioned by IBM.
Jan 21 2021 12:52AM
The risky business of open source

The risky business of open source

Learn about the results of analysis of 351,000 external libraries found in 85,000 applications.
Jan 13 2021 5:55PM
Ensure your e-signatures are legally binding

Ensure your e-signatures are legally binding

Australian e-signature rules have changed. Download this quick Adobe guide to key rules and dates in different states and territories.
Jan 12 2021 6:39PM
Mitigating open source risk in your organisation

Mitigating open source risk in your organisation

Build a framework for prioritising open source application security.
Jan 12 2021 5:46PM
How to choose a WAF that's right for you

How to choose a WAF that's right for you

Stop the bots. Download this F5 guide to web application firewalls
Dec 15 2020 5:29PM
The global telco 5G cloud gaming opportunity

The global telco 5G cloud gaming opportunity

Learn about the potential for cloud gaming and the opportunity for fixed and mobile carriers.
Dec 8 2020 3:07PM
Building a ransomware remediation backup strategy

Building a ransomware remediation backup strategy

This IDC InfoBrief looks at ANZ organisations' experiences in recovering from ransomware attacks, and best practices.
Nov 18 2020 11:28AM

Log In

Email:
Password:
  |  Forgot your password?