ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Computer Weekly – 3 October 2023: Where next for quantum computing?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the head of Amazon's Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now.

  • Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.

  • What is Incident Response? Plans, Teams and Tools

    Sponsored by: AT&T Corp

    Many experts use the terms incident response and incident management interchangeably, but the two are hardly the same. So, what is incident response? And what are the essential elements you need to know for protecting your organization? Read this e-guide to find out.

  • Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.

  • Computer Weekly – 1 August 2023: We're doing AI all wrong

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, AI is being imposed on society from the top down and the socio-economic implications will cause problems – we talk to an expert who says there is a better way. We also find out how hackers – the good kind – are turning to AI to make their work more effective. Read the issue now.

  • Computer Weekly – 25 July 2023: Getting comfortable with data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the head of IT at furniture retailer DFS about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.

  • CW EMEA July 2023: Can we trust AI?

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.

  • Traditional vs. enterprise risk management: How do they differ?

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.

  • 4 steps to building a cybersecurity strategy

    Sponsored by: TechTarget ComputerWeekly.com

    A cybersecurity strategy isn't meant to be perfect, but it must be proactive, effective, actively supported and evolving. Here are the four steps required to get there.

  • Computer Weekly – 13 June 2023: The most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 13th annual UKtech50 list, with this year's most influential person award shared by secretaries of state for science, innovation and technology Michelle Donelan and Chloe Smith. Also, we examine mounting legal challenges faced by the emergence of generative AI tools such as ChatGPT. Read the issue now.

  • Computer Weekly – 23 May 2023: How to secure your software supply chain

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.

  • CW APAC May 2023 – Expert advice on security and threat intelligence

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.

  • Securing your software supply chain

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.

  • Vishing attacks increasing, but AI's role still unclear

    Sponsored by: TechTarget ComputerWeekly.com

    According to cybersecurity company Trellix, the number of vishing attacks in Q4 2022 increased by 142% from Q3 2022. Although the volume of vishing attacks continues to rise, threat researchers say that the role of AI technology in these attacks may have been overestimated.

  • Computer Weekly – 2 May 2023: The ethics of military AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the defence sector looks into using AI to create autonomous weapons, we examine the risks and ethics of military AI. AWS is under fire for not providing vital emissions data to customers – we investigate. And we find out what IT security teams can learn from cyber warfare in Ukraine. Read the issue now.

  • Top 14 ransomware targets in 2023 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.

  • Five Cybersecurity Tips for Every Type of Enterprise

    Sponsored by: Hughes Network Systems

    ph

  • 2023 IT Priorities APAC Report

    Sponsored by: TechTarget ComputerWeekly.com

    IT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.

  • Infographic: IT Priorities 2023 APAC Budget and Buying Patterns

    Sponsored by: TechTarget ComputerWeekly.com

    Each year, Computer Weekly asks IT decision-makers what projects they have planned for the coming year and this year's results show that IT leaders across APAC remain bullish about spending despite macroeconomic headwinds as they continue to invest in strategic areas. Download this infographic to find out more about the results.

  • Video: IT Priorities 2023 APAC

    Sponsored by: TechTarget ComputerWeekly.com

    Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

  • 4 ChatGPT cybersecurity benefits for the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    As the technology matures and improves, expect to see the following beneficial ChatGPT cybersecurity use cases emerge in the enterprise.

  • CW EMEA - June 2023: IT budgets buck trend

    Sponsored by: TechTarget ComputerWeekly.com

    Despite gloomy economic conditions worldwide, IT leaders in EMEA expect budgets to increase this year, according to TechTarget/Computer Weekly's IT Priorities survey. We also look at how health authorities in the UAE are modernising healthcare services, how Finland and Estonia are sharing expertise, and how the Dutch government is addressing bias.

  • CW EMEA - May 2023: The future of work

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.

  • CW EMEA - April 2023: Under attack and stressed out

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how cyber attacks are taking a toll on security professionals, damaging their mental health and forcing some to quit. We also look at Finland's allure for tech entrepreneurs, how software is enabling a new business model for a Swedish car manufacturer, and the importance of backup testing. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.