You've requested...

Download this next:

How hackers and security professionals are using Generative AI

Generative AI has taken the tech landscape by storm due to its impressive utility across a plethora of use cases.

In this webcast, F5 Field CTO, Bart Salaets, and F5 Distinguished Engineer and CTO of Systems and Platforms, Joel Moses, look at how generative AI is affecting the cybersecurity landscape, both as a tool for defenders as well as a weapon for hackers.

Watch now to discover more about AI and security.

These are also closely related to: "Webinar: Tolly Group ADC Testing Results"

  • The state of API security

    APIs are essential to the way modern applications interact with one another. But as their presence expands, API security becomes increasingly important.

    In this webcast, F5 Solutions Architects, Matthieu Dierick and Kostas Skenderidis, discuss the state of API security, focusing specifically on governance and how it is affecting enterprises today.

    Tune in now to learn more about API security.

  • Combine AI & ML to defend your APIs

    APIs, and their increasing presence, represent an expanding attack surface.

    By using AI and ML, F5 Distributed Cloud WAAP aims to provide effective and scalable application and API security, delivering the following benefits:

    • Reduce time documenting APIs
    • Improve API visibility
    • Strengthen API access and authentication
    • And more

    Download this white paper to learn more.

Find more content like what you just read:

  • A new perspective on multi-cloud networking

    Oftentimes, the discussion around multi-cloud networking is limited to a technical discussion of the different technologies that fuel the technology. In this BrightTALK Summit webinar, F5 Field CTO, Bart Salaets analyzes multi-cloud networking as a business problem. Watch now to learn more.

    Download

  • Training announcement: Administering and configuring F5 Advanced WAF

    Recent spikes in DDoS, bot-based, and other automated attacks, signal that hackers are not only targeting web-based applications. Experts at Nexum have curated a training module to help you learn to deploy and operate F5 Advanced WAF to protect web applications from the most critical security risks. Read on to learn more.

    Download

  • IT in Europe: Adopting an Application-Centric Architecture

    Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view.

    Download

  • CW500: A roadmap to software-defined everything – Paddy Power Betfair

    Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.

    Download

  • IT Handbook: Network Considerations for VDI

    This expert handbook provides essential insight into network infrastructure preparations for transitioning to a virtual desktop infrastructure. Discover additional information in the areas of network resilience and redundancy, bandwidth considerations, and network services and security.

    Download

  • Mobility Management Selection Guide

    This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.

    Download

  • MicroScope – September 2021: Stepping forward after Covid

    In this issue, discover what the lasting impact of Covid-19 is likely to be as the channel emerges into a post-pandemic world. Also discover more about disaster recovery for SMEs and how best to make a plan to protect your business, and read about an uptick in cloud-based contact centre-as-a-service solutions

    Download

  • Endpoint Protection Best Practices Manual: Combating issues, problems

    Consult this expert E-Guide for an overview of the evolved threats that are putting your endpoints at risk. Discover the must-see strategies for ensuring endpoint defense by clicking through to read more today.

    Download

  • Key Requirements of Enterprise Mobility Management Solutions

    This expert resource from by industry guru Jack Madden discusses some of the key requirements your business needs to keep in mind when looking for EMM solutions.

    Download

  • Application Delivery Network Buyers' Guide

    The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.

    Download

  • Infographic: Top IT predictions in APAC in 2022

    As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.

    Download

  • CW Middle East Oct to Dec 2016

    In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.

    Download

  • DevSecOps: The smartest path

    In this CIO/CISO guide, discover the tenets of DevSecOps transformation as described by industry experts, covering everything from preparation to the secure development lifecycle to automation.

    Download

  • Scale Your SOC with Cortex Xpanse and Cortex XSOAR Government

    3 attack vectors pose risks to federal agencies due to a lack of visibility, risk assessments, and lateral movement detection: the cloud, connected supply chain vendors, and connected contractors. Discover how automating attack surface management can address these unique security challenges for government agencies in this e-book.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • Kaspersky XDR Expert: Total business visibility & protection

    Kaspersky's XDR Expert offers complete visibility, correlation, and automation across endpoints, networks, and cloud against complex cyberthreats. The on-premises solution guarantees data sovereignty and provides open architecture for easy integration. Discover more in Kaspersky's full overview.

    Download

  • CW APAC buyer's guide to cloud security

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

    Download

  • The exploitation of flaws in the HTTPS protocol

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

    Download

  • Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown

    In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.

    Download

  • Toughening up web and mobile application security

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

    Download

  • Expert E-Book: Data Security and the Cloud

    This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.

    Download

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

    Download

  • Cost savings and business benefits enabled by ADP Global Payroll

    Payroll is a key function in all organizations — and it’s crucial to get it right. For many firms with a global presence, conducting payroll is exacerbated by ever-changing regulatory requirements and local legislation. Download this Forrester report to gain insights into the cost savings and business benefits enabled by ADP Global Payroll.

    Download

  • Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...

    In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.

    Download

  • Expel’s comprehensive 2024 threat report: Predictions & insights

    Expel’s operators do a massive amount of analysis, triage, and complicated problem-solving—stopping intricate attacks every single day. That makes their observations exemplary of the true state of cybersecurity and its related threats. Download this report to explore all the key findings you can use to optimize your cybersecurity strategy in 2024.

    Download

  • Threat prevention techniques: How to build a strong network

    Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.

    Download

  • Storage trends 2016: Storage priorities, cloud appliances and NAS vs object storage

    This guide offers a collection of our most popular articles on storage-related issues from the first few months of 2016.

    Download

  • Essential Guide to Disaster Recovery

    With the mushrooming of disaster recovery technology in the past few years, your excuses for not having a DR plan are falling away. Use this Essential Guide to learn how to take advantage of new technologies that make the disaster recovery provision and planning process easier than it’s ever been.

    Download

  • The top data center & infrastructure challenges in 2024

    Access this e-book for a full data center landscape report that offers deeper insights into IT budget shifts, workload deployment, and infrastructure hardware.

    Download

  • April ezine: Looking to the future

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

    Download

  • MicroScope – May 2018: Bundles deliver surprise package for SMEs

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

    Download

  • Analyst report: 239% ROI from IBM Security Qradar SIEM

    As cyberthreats proliferate, so do security alerts. Because of this, security analysts are pressed to quickly and thoroughly investigate frequent incidents. In this Forrester TEI report, learn how analysts have saved 90% more time when investigating incidents.

    Download

  • A Computer Weekly buyer's guide to networks

    Computer Weekly looks at an increasingly complex networking environment and offers advice for IT leaders on managing it in this 10 page Buyer's Guide.

    Download

  • CW APAC: CIO trends

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead

    Download

  • 5 steps + 4 keys to transform security operations

    Discover in this e-book the 5 Steps and 4 Keys to transforming security operations to combat advanced attacks and improve SOC efficiencies, so you can plan for tomorrow’s SOC, today.

    Download

  • CW Buyer's Guide: Software-defined networking

    Computer Weekly looks at how SDN can give IT administrators greater control over the network infrastructure and make it more flexible and agile part of the business.

    Download

  • A Computer Weekly buyer's guide to cloud bursting

    Cloud ideas expand. In this 12-page buyer's guide, Computer Weekly looks at the benefits and complexities of cloud bursting and the role of on-premise IT.

    Download

  • ServiceNow Strategic Portfolio Management: Economic Analysis

    Strategic portfolio management (SPM) allows organizations to gather their enterprise-wide documentation into a single platform for easier access. Forrester Total Economic Impact Study looks at ServiceNow SPM, using real-world use cases and statistics to provide an accurate estimate of the economics you can expect. Read on to learn more.

    Download

  • Technical Guide on Mobile Security

    Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.

    Download

  • How to Plan for Tomorrow’s SOC, Today

    This playbook outlines 7 best practices that will advance your SOC transformation efforts and allow your organization to start its SOC modernization journey. Read on to get started.

    Download

  • A Computer Weekly Buyer's Guide to Internet of Things Security

    In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

    Download

  • A Computer Weekly Buyer's Guide to Converged Infrastructure

    In this 13-page buyer's guide, Computer Weekly looks at how the technology cuts the numbers of discrete skills and associated costs while demanding that those who remain retrain to ensure they know how to manage all parts of the stack – and the organisation implements it with care and an understanding of the risks.

    Download

  • Virtual Desktop Toolbox

    Read this virtual desktop e-book, featuring experts Brian Madden and Gabe Knuth, to gain key insights on performance monitoring tools, WAN optimization, personalization software, and much more.

    Download

  • A Computer Weekly buyer's guide to secure and agile app development

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

    Download

  • 4 steps to prepare for the AI-driven decade

    Access this research report to learn why the most future-ready organizations will be the ones that make AI a competitive advantage, as well as 4 steps business leaders can take today to accelerate their transformations, starting with evaluating their data and AI maturity.

    Download

  • CW APAC: Expert advice on zero-trust security

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

    Download

  • Container technologies and trends: What enterprises need to know

    In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.

    Download