ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Cyber attackers exploiting poor cloud security

    Sponsored by: TechTarget ComputerWeekly.com

    More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene

  • Even fintech startups battling to meet cyber security skills

    Sponsored by: TechTarget ComputerWeekly.com

    A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • Computer Weekly – 6 August 2019: Using tech to boost staff morale

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.

  • CIO Trends #9: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.

  • 86 million reasons to support No More Ransom

    Sponsored by: TechTarget ComputerWeekly.com

    Anti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world.

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    Sponsored by: TechTarget ComputerWeekly.com

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

  • CW ANZ: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

  • CW ASEAN: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • Computer Weekly – 18 June 2019: Applying AI to road safety

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.

  • CW Europe – June-August 2019: Why are Dutch companies slow to take up the advantages of IoT?

    Sponsored by: TechTarget ComputerWeekly.com

    Rapid adoption of the latest technologies is not only being encouraged by governments, but driven by them. Being the first country to set up the ideal environment for a new technology has huge economic advantages.

  • Computer Weekly – 11 June 2019: Are schools delivering on digital skills?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

  • Computer Weekly – 7 May 2019: Nurturing innovation at DWP

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: TechTarget ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: TechTarget ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • Computer Weekly – 9 April 2019: Using data science at Sainsbury's

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

  • CW Benelux ezine February 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • CIO Trends #8: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.

  • CW Europe – December 2018

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • Artificial intelligence, for real

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide features some of our coverage of AI: showing it realised for business benefit, interacting with the containerisation trend and cyber-security and cogitated upon with scholarly seriousness.

  • CW Nordics ezine November 2018

    Sponsored by: TechTarget ComputerWeekly.com

    Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.