IT-firmaer

Whitepapers:
Whitepapers: 1
Whitepapers: 3
Whitepapers: 0
Whitepapers: 4
Whitepapers: 0
Whitepapers: 4
Whitepapers: 2
Whitepapers: 0
Whitepapers: 0
Whitepapers: 0
  

Din whitepaper-konto

Opret en gratis whitepaper-konto hos Version2 og få direkte og nem adgang til alle dokumenter, whitepapers, rapporter, cases og webcasts

It-nyheder

Forsvarsminister garanterer: Ingen kan læse TDC over skulderen i Bukarest

Ministerens første ilddåbs-samråd handlede om cybersikkerhed.

Nyt rammeværk skal sparke døren ind for machine learning i bankforretningen

En standard for dokumentation af ML-modeller kan hjælpe banker med at få metoderne blåstemplet af Finanstilsynet.

Google giver Android et nyt ‘look’ – og nu er det slut med at opkalde operativsystemet efter søde sager

Android 10 bliver Android 10 – og ikke andet.

Hacker afslører tredje gabende hul i Steam på en måned

Spilplatformen er gennemhullet. Samtidig understreger nyt privilegie-eskaleringsangreb, at Steams bug bounty-program har massive problemer.

Skatteminister: Skat mangler milliarder til it lige nu

Der skal milliarder på bordet, hvis Skats plagede it ikke skal slukke og lukke ved årsskiftet.

Whitepapers

RSA NETWITNESS LOGS

RSA NETWITNESS LOGS

RSA NetWitness Logs is a security monitoring and forensics tool that...

THE PATH FROM GRC TO INTEGRATED RISK MANAGEMENT

THE PATH FROM GRC TO INTEGRATED RISK MANAGEMENT

Successful risk management today may start with governance, risk and...

Harden your attack surface

Harden your attack surface

F-Secure Radar is a turnkey, enterprisegrade vulnerability scanning and...
Tomorrow's security delivered today

Tomorrow's security delivered today

Cyber security never stops. New attackers, tactics, and threats emerge every...
More control more security

More control more security

The amount and sophistication of cyber attacks is increasing.
And any...
Detecting targeted attacks with broad context detection

Detecting targeted attacks with broad context detection

Cyber security is in the midst of a paradigmshift. Targeted attacks are...
Best practices with BYOD

Best practices with BYOD

In today’s modern society the requirement for employees to be based within a...
Open Banking: Security considerations & potential risks

Open Banking: Security considerations & potential risks

The concept of Open Banking is an innovative one. However, as with any new...