ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Top 10 cyber crime stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.

  • A Computer Weekly buyer's guide to SIEM and SOAR

    Sponsored by: TechTarget ComputerWeekly.com

    The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.

  • CW Europe - September-November 2021: Dutch researchers build security software to mimic human immune system

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. Also find out about the so-called "Klarna academy" in Stockholm, which has created the next set of Nordic fintech entrepreneurs.

  • How to Shrink Supply Chain Risk

    Sponsored by: TechTarget

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

  • CW Benelux - August-October 2021: Netherlands sees increase in the number of women opting for an ICT career

    Sponsored by: TechTarget ComputerWeekly.com

    The IT skills gap in the Netherlands could be about to narrow as more women take up jobs in the sector. Figures from last year revealed that the number of female ICT professionals grew by 6.5%, while the number of male ICT professionals increased by only 1.7%. Read more about it in this issue.

  • Ransomware Weather Report - July 2021

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.

  • Computer Weekly - 27 July 2021: Are we getting cyber security skills all wrong?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the chair of the new UK Cyber Security Council tells us how she plans to fundamentally reimagine what working in IT security means. Our latest buyer's guide examines ERP modernisation and its role in digital transformation. And we take an in-depth look at the first preview version of Windows 11. Read the issue now.

  • CW APAC – July 2021: Trend Watch: Supply Chain Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain

  • Fraud management: A perennial business issue

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

  • The CISO's guide to supply chain security

    Sponsored by: TechTarget ComputerWeekly.com

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

  • Essential Guide: How APAC firms can ride out the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, and how they have responded from a technology perspective by driving initiatives spanning digital transformation, business continuity, cloud, cyber security and remote working.

  • Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.

  • Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.

  • What is IoMT Security?

    Sponsored by: Palo Alto Networks

    The Internet of Things (IoT) looks drastically different depending on industry vertical. This white paper explores the IoT subclassification known as the Internet of Medical Things (IoMT), which encompasses any device connected to a healthcare provider’s network. Read on to learn about IoMT adoption and how to secure IoMT devices.

  • The Healthcare CISO’s Guide to IoT Security

    Sponsored by: Palo Alto Networks

    As a result of the pandemic, the usage and adoption of Internet of Things (IoT) devices in the healthcare industry has skyrocketed. Read The Healthcare CISO’s Guide to IoT Security for everything you need to know about clinical device management and IoT security in the healthcare industry.

  • Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.

  • Infographic: 5 ways backup can protect against ransomware

    Sponsored by: TechTarget ComputerWeekly.com

    Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. This infographic looks at the top 5 steps CIOs should consider.

  • CW Benelux - May-July 2021: Netherlands university launches centre of expertise in applied AI

    Sponsored by: TechTarget ComputerWeekly.com

    Amsterdam University of Applied Sciences has launched a centre of expertise in applied artificial intelligence, and students from all faculties of the university will learn how to apply AI in their field of study.

  • Security Think Tank: Biden's Cyber Security Plan

    Sponsored by: TechTarget ComputerWeekly.com

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

  • Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.

  • Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.

  • Manchester United praised for swift response to cyber attack

    Sponsored by: TechTarget ComputerWeekly.com

    The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

  • Why CISOs need advanced network security strategies now

    Sponsored by: TechTarget Security

    Network security has to move beyond the basics. With systems and data under assault by sophisticated attackers, CISOs and other security leaders need to put in place advanced network security strategies that incorporate the latest technologies -- AI, machine learning and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.