Cybersecurity Research
-
Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.
-
4 ChatGPT cybersecurity benefits for the enterprise
Sponsored by: TechTarget ComputerWeekly.comAs the technology matures and improves, expect to see the following beneficial ChatGPT cybersecurity use cases emerge in the enterprise.
-
AI in Fraud Management: Uses cases, benefits and challenges
Sponsored by: TechTarget ComputerWeekly.comAI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
-
7 top predictive analytics use cases
Sponsored by: TechTarget ComputerWeekly.comAcross industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.
-
State Of Encrypted Attacks 2022
Sponsored by: ZscalerLearn how the encrypted threat landscape has evolved and what you can do about it in this ThreatLabz report. You’ll discover what was learned from analyzing encrypted traffic across the Zscaler cloud, blocking 24 billion threats over HTTPS along the way.
-
Cybersecurity Posture Survey – Looking towards 2023
Sponsored by: BitdefenderCybersecurity is now, more than ever, a key factor in your business success. Attackers are more and more sophisticated and resistant to the traditional prevention tools. You need a brand-new strategy to keep up. Explore this executive summary to evaluate your current cybersecurity status and learn how to improve your cybersecurity posture.
-
12 API security best practices
Sponsored by: TechTarget ComputerWeekly.comAs more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
-
5 types of data security
Sponsored by: TechTarget ComputerWeekly.comBecause no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
-
8 big data use cases for businesses and industry examples
Sponsored by: TechTarget ComputerWeekly.comFor businesses, the ability to deal with big data is important: it can bring companies significant business value, from enabling cost optimization and improved efficiency to providing better customer insight. In this article, we'll explore 8 use cases that show big data's profound impact on businesses across different industry sectors.
-
Multifactor authentication: What are the pros and cons?
Sponsored by: TechTarget ComputerWeekly.comOne of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
-
MicroScope – February 2023: Opportunities in security
Sponsored by: MicroScopeIn this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
-
The ultimate guide to identity & access management
Sponsored by: TechTarget ComputerWeekly.comBusinesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
-
How do cybercriminals steal credit card information?
Sponsored by: TechTarget ComputerWeekly.comCybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
Infographic: 5 cybersecurity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comThe key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
-
Top 10 ANZ IT stories of 2022
Sponsored by: TechTarget ComputerWeekly.comIn this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.
-
Top 10 ASEAN IT stories of 2022
Sponsored by: TechTarget ComputerWeekly.comDespite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.
-
Top IT Predictions in APAC in 2023
Sponsored by: TechTarget ComputerWeekly.comIn this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.
-
Computer Weekly - 13 December 2022: AI experts question tech industry's ethical commitments
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the proliferation of ethical frameworks has done little to change how artificial intelligence is developed – we look at the challenges. We examine the future of the UK semiconductor sector as the government launches a review. And we hear how NatWest has put data at the heart of customer strategy. Read the issue now.
-
A Computer Weekly buyer's guide to anti-ransomware
Sponsored by: TechTarget ComputerWeekly.comThe threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
-
Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
-
Guide to building an enterprise API strategy
Sponsored by: TechTarget ComputerWeekly.comToday's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
-
Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
-
Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
-
Computer Weekly – 15 November 2022: How to protect against ransomware attacks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.
-
Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.