ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet Security Research

  • Proving ownership of IPv6 addresses

    Sponsored by: ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • Rethinking the Cyber Security of Consumer Internet of Things

    Sponsored by: ComputerWeekly.com

    The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions.

  • The Hacker Report

    Sponsored by: HackerOne

    Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.

  • What's Threatening IT Security?

    Sponsored by: Aruba Networks

    What are the causes of gaps in IT security? Is the Internet of Things making it worse? Can AI and automation fix it? Download this resource to see what the Ponemon Institute recently found.

  • CW Middle East ezine October 2018

    Sponsored by: ComputerWeekly.com

    It's still early days for the Middle East when it comes to artificial intelligence and robotic process automation, but things are picking up.

  • CW Benelux May 2018

    Sponsored by: ComputerWeekly.com

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

  • CW ASEAN: SD-WAN helps find best route to cloud

    Sponsored by: ComputerWeekly.com

    This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.

  • CW ANZ: OpenStack gains a foothold in Australia

    Sponsored by: ComputerWeekly.com

    OpenStack's popularity has increased across the globe. A 2017 survey has revealed a 44% increase in OpenStack deployments compared to a year earlier – and 74% of all deployments occurred outside the U.S. In this issue of CW ANZ, we look at how OpenStack has changed the way Australian enterprises operate their IT infrastructure.

  • CW Europe – March 2018

    Sponsored by: ComputerWeekly.com

    Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.

  • The next wave of IoT in Asia: What to expect in 2018

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.

  • World Economic Forum Global Risks Report 2018

    Sponsored by: ComputerWeekly.com

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

  • CW Middle East Jan to Mar 2018

    Sponsored by: ComputerWeekly.com

    The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • CW Benelux November 2017

    Sponsored by: ComputerWeekly.com

    The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.

  • CW Nordics August 2017

    Sponsored by: ComputerWeekly.com

    The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.

  • CW Benelux August 2017

    Sponsored by: ComputerWeekly.com

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

  • Print security: An imperative in the IoT era

    Sponsored by: ComputerWeekly.com

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

  • IoT & the Enterprise: Exploring Opportunities and Challenges in Asia

    Sponsored by: ComputerWeekly.com

    Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Computer Weekly: Leadership bonus – analysing our UK salary survey

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.

  • Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

    Sponsored by: Cisco Umbrella

    Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.

  • DDoS Prevention For Attacks That Bypass DNS Rerouting

    Sponsored by: Radware

    In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.

  • How Healthcare Organizations are Tackling IoT Device Management

    Sponsored by: Cisco Umbrella

    Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.