ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • In 2017, the insider threat epidemic begins

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

  • Are we trusting social networks too much?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Financial markets regulatory outlook 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • Focus: Securing for the future

    Sponsored by: TechTarget ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Protecting your organisation from itself

    Sponsored by: TechTarget ComputerWeekly.com

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

  • Computer Weekly: Data Danger

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

  • CW Europe: December 2016 - February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • Trouble at your door: targeted cyber attacks in the UK and Europe

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Policing cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

  • Focus: IT Security in the Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

  • Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.

  • Cyber Security 2016 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits

    Sponsored by: TechTarget ComputerWeekly.com

    Tech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.

  • What to Include in an SD-WAN Security Checklist

    Sponsored by: TATA Communications

    Ensuring security in a software-defined WAN implementation is crucial, but it's often easier said than done. The SD-WAN security equation comprises multiple variables. In this e-guide, uncover 4 different areas where enterprises should consider SD-WAN and security, as well as the core capabilities to include in an SD-WAN security checklist.

  • How IAM Systems Support Compliance

    Sponsored by: Beta Systems

    Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.

  • 5 IAM Trends Shaping the Future of Security

    Sponsored by: Beta Systems

    Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.

  • Incident Response Tools: How, When & Why to Use Them

    Sponsored by: Claranet

    Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.

  • Kaspersky Lab’s COVID-19 Relief Initiatives

    Sponsored by: Kaspersky

    Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.

  • Employ AI for Cybersecurity, Reap Strong Defenses Faster

    Sponsored by: TechTarget Security

    Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.

  • Security Access Controls Over Identities Must Be Priority

    Sponsored by: TechTarget Security

    No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.

  • Assess Secure Web Gateways to Suit Your Network Security Needs

    Sponsored by: TechTarget Security

    Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.

  • Configuration Management: Addressing GRC Challenges

    Sponsored by: ServiceNow

    Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).

  • Top 10 IT security stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.