ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.

  • MicroScope – June 2022: A return to face-to-face meetings

    Sponsored by: MicroScope

    With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel

  • CW Europe - June-August 2022: Russia escalates cyber war on Ukraine

    Sponsored by: ComputerWeekly.com

    Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.

  • Cyber Resilience for Dummies

    Sponsored by: Mimecast

    Today’s organizations are more connected than ever – IoT and cloud technologies enable massive, interconnected ecosystems. In order to ensure the security of these fragile networks, security leaders are opting for cyber resilience practices. Download your copy of Cyber Resilience for Dummies to learn more about the cyber resilience imperative.

  • Secure Optical Networking for Your Enterprise

    Sponsored by: Ribbon Communications

    Data is the lifeblood of any business. Users need uninterrupted access, and the user experience is critical to productivity. Luckily, optical encryption is now easier and more economical than ever before. Read more to learn about securing today’s data across dynamic networks.

  • Raising the Bar for Reliability

    Sponsored by: Datto, Inc.

    In competitive MSP market in which a moment of downtime can cost millions, you need to raise the bar when it comes to business continuity and stability. This white paper will show you how you can establish reliable, valuable backup and recovery capabilities. Read on to learn more.

  • Selling BCDR Made MSPeasy

    Sponsored by: Datto, Inc.

    Despite the logic of MSPs providing strong business continuity and disaster recovery (BCDR) support, MSPs still spend too much time justifying BCDR costs. Download this e-book for access to tips and scripts that will help improve the conversations around BCDR capabilities, allowing you to demonstrate the true benefits of a fully managed solution.

  • Infographic: 6 information governance best practices

    Sponsored by: ComputerWeekly.com

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

  • Infographic: 6 file transfer best practices

    Sponsored by: ComputerWeekly.com

    File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.

  • MicroScope – May 2022: Charging at SME security challenges

    Sponsored by: MicroScope

    With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working

  • Royal Holloway: Secure multiparty computation and its application to digital asset custody

    Sponsored by: ComputerWeekly.com

    For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Computer Weekly - 5 April 2022: Police use of AI needs overhaul to prevent abuse

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, a House of Lords inquiry calls for a rethink on how police forces use AI technologies – we examine the issues. Our new buyer's guide looks into edge datacentres. And the EU and US agree a new data protection deal to replace Privacy Shield, but will it stand up to scrutiny? Read the issue now.

  • MicroScope – April 2022: Can life ever really be simple for partners?

    Sponsored by: MicroScope

    In this issue, discover whether simplifying programmes and interactions with partners is achievable, and what barriers stand in the way for vendors looking to make life easier. Also read about why reskilling in a post-pandemic world is key to boosting industry, and learn about what to expect from the manufacturing sphere over the next year

  • 7 NAS encryption best practices to protect data

    Sponsored by: ComputerWeekly.com

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

  • 5 cybersecurity myths and how to address them

    Sponsored by: ComputerWeekly.com

    Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.

  • Computer Weekly - 22 March 2022: One year on from IR35 reforms - why IT skills are harder to find

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, a year after IR35 tax reforms were introduced, we assess the impact on the UK's IT talent pool – and it's not looking good. We examine the rise of industry clouds, and how they are changing the market. And we find out how London councils plan to work together on data and innovation. Read the issue now.

  • How Google Workspace helps protect your organization

    Sponsored by: Google Workspace

    The way we work has changed – organizations are creating more data than ever before and looking to store it in the cloud for easy access, creating new security challenges that legacy collaboration tools can’t handle. Read this white paper to learn how to keep your business safer with a zero-trust security model designed for collaboration.

  • 4 data privacy predictions for 2022

    Sponsored by: ComputerWeekly.com

    Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.

  • Ransomware: The situation at the beggining of 2022

    Sponsored by: ComputerWeekly.com

    2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.

  • Computer Weekly - 8 March 2022: Using technology to protect human rights

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we investigate how technology is being used to tackle human rights abuses worldwide. We offer a step-by-step guide to disaster recovery in the cloud era. And we examine the vital, and successful, role of digital and data in the UK Covid-19 vaccine roll-out. Read the issue now.

  • MicroScope – March 2022: Taking the steady approach to becoming an MSP

    Sponsored by: MicroScope

    In this issue, take a closer look at the risks and pitfalls on the journey to becoming a manages services provider, read about expected ongoing change and consolidation in the year ahead, and discover what experts have to say on the skills and supply chain shortages

  • A Computer Weekly buyer's guide to data integration

    Sponsored by: ComputerWeekly.com

    Data integration is increasing in importance for businesses. In this 17-page buyer's guide, Computer Weekly looks at its complex nature, four key trends to assess, which approaches to take when linking IT systems and why Nasa's Ron Thompson regards data as so important.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • Infographic: SIEM vs. SOAR vs. XDR

    Sponsored by: ComputerWeekly.com

    IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.