ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Computer Weekly - 18 January 2022: The race to quantum computing

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, researchers are racing to create the first commercially useful quantum computer – we look at one of the European candidates. Cyber security is one of the greatest risks facing the global economy, warns the World Economic Forum. And we examine the role of employee experience in hybrid working. Read the issue now.

  • MITRE ATT&CK, a guide for businesses in 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.

  • Infographic: 5 cybersecurity predictions for 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.

  • Secure Beyond Breach: A Practical Guide

    Sponsored by: Illumio

    Based on real-world scenarios and written by industry experts who have been in the trenches, Secure Beyond Breach is a practical guide that details how to implement a micro-segmentation strategy from start to finish. It's an essential read for all cybersecurity professionals, from security architects to IT infrastructure teams to CISOs.

  • Enable End-to-end Zero Trust To Achieve Effective Outcomes

    Sponsored by: Illumio

    Illumio was highlighted as a leader in The Forrester Wave: Zero Trust eXtended Ecosystem Platform Providers report based on their current offering and strategy regarding end-to-end Zero Trust in the post-perimeter era. Read this report to learn more about Illumio’s offering and discover why Forrester gave it such high regards.

  • Efficacy Of Micro-segmentation Assessment Report

    Sponsored by: Illumio

    The purpose of incorporating micro-segmentation as part of a larger Zero Trust security strategy is to prevent threat actors from moving laterally within a network – but how effective is micro-segmentation in practice? Read this research report for an in-depth analysis of the capabilities, challenges and potential benefits of micro-segmentation.

  • Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.

  • Computer Weekly - 14 December 2021: The rules for a safer internet

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.

  • A Computer Weekly buyer's guide to post-Covid-19 supply chain management

    Sponsored by: TechTarget ComputerWeekly.com

    The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.

  • The Benefits of Using a Data Driven Approach to Risk Management

    Sponsored by: Ostendio

    PH

  • Computer Weekly - 23 November 2021: Can the tech community show how to save the world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.

  • Infographic: 4 types of ransomware

    Sponsored by: TechTarget ComputerWeekly.com

    Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.

  • Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.

  • Computer Weekly - 9 November 2021: How a cloud-first strategy helped save animals in the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the RSPCA about how its cloud-first strategy helped to save animals throughout the pandemic. Data warehouses have been part of the IT landscape for 30 years – but are they now old technology, and what's next? And we assess how Brexit has affected risk and resilience in the datacentre. Read the issue now.

  • Infographic: Ransomware timeline

    Sponsored by: TechTarget ComputerWeekly.com

    Ransomware isn't anything new, but it remains a major challenge for individuals, companies, governments and organizations. In this infographic, we take a look at some of the most notable examples of ransomware from the past 30-plus years here.

  • Enterprise Data Loss Prevention, Revisited

    Sponsored by: Palo Alto Networks

    To protect data assets both in motion and at rest, a modern approach to data loss prevention (DLP), designed for today’s digital enterprise, is paramount. Read this exclusive ESG white paper to learn more about rethinking DLP for the modern workflow.

  • Overcoming Enterprise Data Protection Challenges

    Sponsored by: Palo Alto Networks

    Data usage and dependence has evolved rapidly in recent years – which has led to a rise in the necessity for effective data loss prevention (DLP), especially as organization migrate their data to the cloud. Access this exclusive e-book for a closer look at modern data protection challenges and requirements and an intro to cloud-based DLP.

  • Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.

  • CW APAC, October 2021: Tech Career Guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region

  • Infographic: Ransomware Weather Report 2021

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic: We take a look at the worldwide Ransomware landscape in 2020 and 2021. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.

  • Infographic: Most valuable cybersecurity certifications

    Sponsored by: TechTarget ComputerWeekly.com

    A consensus of industry professionals rank these security certifications as the most coveted by employers and security pros.

  • Essential Guide: APAC women in cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.

  • Password Security Guidelines

    Sponsored by: TechTarget

    In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.

  • Ransomware Weather Report - July 2021

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.

  • Fraud management: A perennial business issue

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.