Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=10"
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
-
Endpoint security: Hybrid work changes the game
Sponsored by: TechTarget ComputerWeekly.comA scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not. In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.
-
Getting Cloud Security Right
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
-
Hybrid cloud: What enterprises need to know today
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we take a look at some of the latest thinking and trends around hybrid cloud, and shine a light on some of the enterprises who are favouring this IT infrastructure approach.
-
The DevSecOps Playbook Practical Steps for Producing Secure Software
Sponsored by: Veracode, Inc.What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.
-
The DevSecOps Playbook
Sponsored by: VeracodeThis e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.
-
Computer Weekly – 16 April 2019: Digital transformation at the Crown Prosecution Service
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine how the Crown Prosecution Service is helping to digitally transform the UK justice system. We report from Google's cloud conference on the firm's plans to expand its presence in enterprise IT. And we look at the opportunities and challenges of using AI in the education sector. Read the issue now.
-
Computer Weekly – 5 July 2022: How to get the right level of cyber insurance
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.
-
CW Europe - September-November 2021: Dutch researchers build security software to mimic human immune system
Sponsored by: TechTarget ComputerWeekly.comIn this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. Also find out about the so-called "Klarna academy" in Stockholm, which has created the next set of Nordic fintech entrepreneurs.