All Research Sponsored By:TechTarget ComputerWeekly.com
-
How to achieve container security best practice
In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
Avon calling: what happens when lockdown eliminates your business model?
In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.
-
Royal Holloway: Purple team playbook – threat modeling for security testing
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
-
Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
-
10 AI and machine learning use cases in ITSM
AI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 10 AI and machine learning use cases for ITSM
-
CIO Trends APAC: Developing a data-driven culture
In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.
-
Why you need convergence
You need convergence today more ever. Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive.
-
Computer Weekly - 14 July 2020: Is digital art coming of age during lockdown?
In this week's Computer Weekly, as the pandemic forces many sectors into a business rethink, digital art is hoping to capitalise on changing times. Chinese supplier Lenovo is dominating the supercomputer market – we examine how it got there. And as datacentre engineers become key workers, we look at the health and safety issues. Read the issue now.
-
CW ANZ, July 2020: Expert Advice on Security
In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
CW APAC, July 2020: Trend Watch: Security
In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
-
Royal Holloway: Driverless vehicle security for military applications
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
-
Royal Holloway: Man proposes, fraud disposes
In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Making the case for cloud-based security
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
-
Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
-
Converged infrastructure fundamentals
Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown
In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.
-
A Computer Weekly buyer's guide to data quality
The value of data depends on its quality. In this 14-page buyer's guide, Computer Weekly looks at how the coronavirus pandemic has highlighted the challenges of inaccurate datasets, the new analytics techniques improving data quality and Informa's use of Collibra software
-
Royal Holloway: An enhanced approach for USB security management
USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
-
CIO Trends #11: Nordics
The Nordic region is a place where people aren't afraid to try out the latest digital technologies. In banking for example, the region is leading the way in the age of open banking. Read here why this might be the case. But it goes way beyond the technology itself and has a lot to do with the attitude to change in the region.
-
CW Middle East July-September 2020: Technology helps SMEs in UAE combat coronavirus crisis
The UAE, like the rest of the world, continues to be heavily impacted by the fallout of the Covid-19 pandemic – and technology is helping to lead the fight.
-
CIO Trends #11: Middle East
Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.
-
CIO Trends #11: Benelux
The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
-
Unlocking value in the railway network's data
In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.