ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet Security Research

  • 7 best practices for Web3 security risk mitigation

    Sponsored by: ComputerWeekly.com

    Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.

  • Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies

    Sponsored by: ComputerWeekly.com

    This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.

  • Royal Holloway: Attack mapping for the internet of things

    Sponsored by: ComputerWeekly.com

    The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.

  • Computer Weekly – 14 January 2020: Building the internet of the future

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, Cisco unveils the $5bn platform that it believes will be the future of the internet – we look through the details. The McLaren Formula One team discusses how IoT and data analytics have been key to its revival on the track. And we examine the importance of diversity in software development. Read the issue now.

  • Computer Weekly – 15 October 2019: Securing the internet of things

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

  • Computer Weekly – 15 October 2019: Securing the internet of things

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

  • CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase

    Sponsored by: ComputerWeekly.com

    Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.

  • PROTECTING YOUR ORGANIZATION WITH STRONG SECURITY CONTROLS

    Sponsored by: OneNeck IT

    The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.

  • Proving ownership of IPv6 addresses

    Sponsored by: ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • CW Middle East ezine October 2018

    Sponsored by: ComputerWeekly.com

    It's still early days for the Middle East when it comes to artificial intelligence and robotic process automation, but things are picking up.

  • CW Benelux May 2018

    Sponsored by: ComputerWeekly.com

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

  • CW ASEAN: SD-WAN helps find best route to cloud

    Sponsored by: ComputerWeekly.com

    This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.

  • CW Europe – March 2018

    Sponsored by: ComputerWeekly.com

    Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.

  • The next wave of IoT in Asia: What to expect in 2018

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.

  • World Economic Forum Global Risks Report 2018

    Sponsored by: ComputerWeekly.com

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

  • CW Middle East Jan to Mar 2018

    Sponsored by: ComputerWeekly.com

    The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • CW Benelux November 2017

    Sponsored by: ComputerWeekly.com

    The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.

  • CW Nordics August 2017

    Sponsored by: ComputerWeekly.com

    The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.

  • CW Benelux August 2017

    Sponsored by: ComputerWeekly.com

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

  • Print security: An imperative in the IoT era

    Sponsored by: ComputerWeekly.com

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

  • NB-IoT: 3 Use Cases and Challenges

    Sponsored by: T-Mobile for Business

    Narrowband and IoT combined can bring out the best parts of both technologies in smart cities, asset tracking and agricultural projects, but NB-IoT use cases have disadvantages. In this e-guide learn more about these use cases and challenges.

  • Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

    Sponsored by: Cisco Umbrella

    Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.