ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Guide to building an enterprise API strategy

    Sponsored by: ComputerWeekly.com

    Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.

  • Computer Weekly - 29 November 2022: How to stop data retention from killing the planet

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.

  • Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.

  • Computer Weekly – 15 November 2022: How to protect against ransomware attacks

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.

  • The Essential Guide To Fraud

    Sponsored by: Splunk

    Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.

  • Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.

  • CW Middle East - October-December 2022: Qatar strengthens cyber defences ahead of FIFA World Cup

    Sponsored by: ComputerWeekly.com

    Being the first Arab country to host the World Cup is pressure enough on Qatar, but there is also a massive cyber security challenge associated with any event of this magnitude. Read about its preparations. Also in this issue, find out about the unique challenges of hiring IT professionals in Saudi Arabia.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • How to get started with SASE

    Sponsored by: ComputerWeekly.com

    Implementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.

  • Zero Trust Impact Report

    Sponsored by: Illumio

    In this eGuide, you will hear that many organizations have begun to implement Zero Trust architectures to modernize their cybersecurity programs and attempt to limit the impact of attacks. Take this survey and gain insight into how organizations are faring with their Zero Trust initiatives.

  • Computer Weekly – 20 September 2022: A gold medal performance for networking

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.

  • 9 Common Cryptocurrency Scams in 2022

    Sponsored by: ComputerWeekly.com

    Even though cryptocurrency is a newer trend, thieves are using old methods to steal. Here are some of the common cryptocurrency scams to watch out for.

  • 10 types of security incidents and how to handle them

    Sponsored by: ComputerWeekly.com

    Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.

  • MicroScope – September 2022: The green agenda

    Sponsored by: MicroScope

    Sustainability is now seen as a necessity for business to have on their agenda, so read about how the channel is turning green to capture customer attention. Also discover how the pandemic has changed sales forever and boosted the importance of relationships, as well as learn about how to handle currency fluctuations, rises and inflation.

  • The Human Factor 2022

    Sponsored by: Proofpoint

    Discover how to address the human factors of cybersecurity and inform yourself of the scope of today’s user-based risks by accessing a copy of this report, The Human Factor: People-centric Cybersecurity.

  • Threat Intel Roundup

    Sponsored by: Integrity360

    To assist your efforts in staying up to date, Integrity360 has pulled together this Threat Intel Roundup report that spotlights attacks, cybersecurity updates, and data loss incidents from April 2022 onward. Stay up to date, and protect your business from the latest hacker tactics, by downloading the full report here.

  • Computer Weekly - 23 August 2022: How digital technology rescued Merlin

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to Merlin Entertainments – operator of Legoland and Alton Towers – about how digital saved the company when Covid shut its theme parks. We find out how data analytics can help to track greenhouse gas emissions. And Southern Water explains how data supports vulnerable customers. Read the issue now.

  • Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.

  • The Defender's Advantage Cyber Snapshot

    Sponsored by: Mandiant

    Exposed data breaches and leaked secrets in public code repositories alone account for 56% of critical security issues—and these are just the top two exploits. To detect and remediate similar issues, as well as bolster your own cyber defenses, read this Defender’s Advantage Cyber Snapshot report.

  • A Computer Weekly buyer's guide to cyber insurance

    Sponsored by: ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

  • CW Benelux - August-October 2022: Belgium seeks top tech talent

    Sponsored by: ComputerWeekly.com

    The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.

  • Cybersecurity Trends for Mid-Sized Organizations

    Sponsored by: Egnyte

    Egnyte worked with an independent research firm to conduct a survey among 400 companies in North America to learn about trends related to: cybersecurity hygiene, ransomware, incident response, and content sprawl. Download the results here.

  • How to Perform a Cybersecurity Risk Assessment in 5 Steps

    Sponsored by: Koris365

    What is at the heart of a cybersecurity risk assessment? Find out by browsing this expert TechTarget guide on How to Perform a Cybersecurity Risk Assessment in 5 Steps. Inside, the guide provides can’t-miss advice on how to conduct these assessments in your business.

  • Why Companies Need Cybersecurity and Cyber Resilience

    Sponsored by: Koris365

    Read the following custom TechTarget e-guide on Why Companies Need Cybersecurity and Cyber Resilience to demystify the definition of cybersecurity and learn how to align it with cyber resilience in your organization.

  • Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.