Information Security Research
-
April ezine: SD-WAN more than just networking
Sponsored by: MicroScopeAn issue covering SD-WAN, storage innovations and opportunities for channel growth
-
Implementing Agile Security Response
Sponsored by: ServiceNowData breaches constantly threaten enterprises today. The biggest challenge that organizations face is coordinating incident response across the organization. Download this resource for access to an essential security operations solution checklist to help your organization better respond to security threats and vulnerabilities.
-
December ezine: Tech for good
Sponsored by: MicroScopeRead about why more CEOs are discussing the positives of technology and why the channel will need to do the same
-
September ezine: Thinking digital in the world of storage
Sponsored by: MicroScopeThe full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry
-
The difficulties of defending against web tracking
Sponsored by: ComputerWeekly.comThis article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
-
Advance Your Career with the Right Cloud Security Certifications
Sponsored by: TechTargetThe fact is that IT security pros with cloud computing expertise are becoming the highest paying jobs in the industry, especially for those with the proper cloud security certifications. In our expert guide, Cloud Security Certifications 101, find out why. To unlock access to this expert guide, participate in our 5-10-minute cloud security survey.
-
The Top Cyber Security Trends in ANZ in 2017
Sponsored by: ComputerWeekly.comIn this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
-
MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate
Sponsored by: MicroScopeAn e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.
-
MicroScope E-Zine: January 2017
Sponsored by: MicroScopeIs the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.
-
Computer Weekly – Digital giving – transforming Save the Children with technology
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.
-
Facing up to emerging technology: Risks and benefits
Sponsored by: SearchCIOCutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
-
Incident response playbook in flux as services, tools arrive
Sponsored by: SearchSecurity.comThe enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
-
Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
Sponsored by: SearchSecurity.comRecent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
-
Get Smart About Threat Intel Tools and Services
Sponsored by: SearchSecurity.comLearn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
-
ITSM strategy for an agile, secure digital transformation
Sponsored by: SearchCIO.comAs digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
-
Cyber-Risk Strategies and Models for a Post-Perimeter Age
Sponsored by: SearchSecurity.comIn our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
-
Build your Content Security and Document Management Plan
Sponsored by: AdobeIn this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
-
Get Smart About Threat Intel Tools and Services
Sponsored by: SearchSecurity.comLearn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
-
Secure Information Exchange in the Digital Age
Sponsored by: OpenTextForrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
-
Crafting an Insider Threat Program: Why and How
Sponsored by: SearchSecurity.comTackling IT threats is even harder when the breach -- malicious or inadvertent -- originates in the company. Learn how to handle insider threats.
-
Judging MSSP Options With Care
Sponsored by: SearchSecurity.comThe managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider.
-
Minimizing Cyber Risk with Better Threat Detection and Incident Response
Sponsored by: SearchSecurity.comToday's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
-
Computer Weekly – 3 May 2016: How high-speed rail is accelerating innovation
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we find out how HS2, the UK's planned high-speed railway, is developing its IT from scratch and having to predict the future. We hear from DevOps experts who try to bust some of the myths around continuous software delivery. And our latest buyer's guide analyses graph databases. Read the issue now.
-
Computer Weekly – 19 April 2016: The hunters who prey on cyber criminals
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now.
-
Computer Weekly – 12 April 2016: How IT in a portacabin supports £1bn London Bridge station overhaul
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we find out how a temporary IT set-up based in a portacabin is supporting the UK's largest critical infrastructure project. Our latest buyer's guide looks at converged infrastructure products. And we analyse research showing data protection topping the list of UK security priorities. Read the issue now.