ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • The Defender's Advantage Cyber Snapshot

    Sponsored by: Mandiant

    Exposed data breaches and leaked secrets in public code repositories alone account for 56% of critical security issues—and these are just the top two exploits. To detect and remediate similar issues, as well as bolster your own cyber defenses, read this Defender’s Advantage Cyber Snapshot report.

  • Prepare For New And Unpredictable Cyberthreats

    Sponsored by: Optiv

    Read this exclusive Gartner report to view 3 analyst-backed suggestions for constructing a more adaptive cybersecurity program to counter unknown threats coming down the pipeline.

  • A Computer Weekly buyer's guide to cyber insurance

    Sponsored by: ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

  • CW Benelux - August-October 2022: Belgium seeks top tech talent

    Sponsored by: ComputerWeekly.com

    The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.

  • Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.

  • A Computer Weekly buyer's guide to supply chain security

    Sponsored by: ComputerWeekly.com

    Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.

  • Commvault cyber threat protection and recovery

    Sponsored by: Commvault

    Access this data sheet to learn about Commvault’s 7 steps to securing data, made possible by their multi-layered cyber threat protection and recovery solution.

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

  • Buyer's guide to backup and recovery software

    Sponsored by: ComputerWeekly.com

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

  • Computer Weekly - 12 July 2022: The most influential people in UK technology

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 50 most influential people in UK IT for 2022, and talk to the winner of the 12th annual UKtech50, National Cyber Security Centre CEO Lindy Cameron. Also, we take an in-depth look at the crisis in chip supply and what's needed to solve it. Read the issue now.

  • Computer Weekly – 5 July 2022: How to get the right level of cyber insurance

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.

  • Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.

  • Tech career guide: Cyber security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.

  • Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.

  • CW Europe - June-August 2022: Russia escalates cyber war on Ukraine

    Sponsored by: ComputerWeekly.com

    Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.

  • Royal Holloway: Corporate under-reporting of cyber crime

    Sponsored by: ComputerWeekly.com

    Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.

  • APAC career guide: Becoming a cyber security pro

    Sponsored by: ComputerWeekly.com

    Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.

  • Royal Holloway: Attack mapping for the internet of things

    Sponsored by: ComputerWeekly.com

    The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.

  • 2 types of endpoint encryption to protect data

    Sponsored by: ComputerWeekly.com

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

  • BlackCat emerges as one of the top ransomware threats

    Sponsored by: ComputerWeekly.com

    After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

  • MITRE ATT&CK: Climb to the top

    Sponsored by: ComputerWeekly.com

    The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.

  • Royal Holloway: Cloud-native honeypot deployment

    Sponsored by: ComputerWeekly.com

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • Transforming risk Why digital transformation depends on integrated risk management

    Sponsored by: ServiceNow

    Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.