ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet Security Research

  • Enable Your Network Transformation with Secure and Agile Architecture

    Sponsored by: TATA Communications

    Will your network have an innate ability to adapt? Will you be able to provide secure, reliable connections to your employees and customers? Will you have a cloud architecture that is agile and allows for seamless communication and quicker development? View this white paper for a closer look at what you need for a better network.

  • 10 Best Practices for Internet Security

    Sponsored by: Verizon

    Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.

  • Enterprise IoT Security Blueprint 2.0

    Sponsored by: Device Authority

    The Internet of Things (IoT) presents a massive business opportunity across almost every industry. But to realize that opportunity, enterprise IoT security must become a primary focus.

  • NB-IoT: 3 Use Cases and Challenges

    Sponsored by: T-Mobile for Business

    Narrowband and IoT combined can bring out the best parts of both technologies in smart cities, asset tracking and agricultural projects, but NB-IoT use cases have disadvantages. In this e-guide learn more about these use cases and challenges.

  • Computer Weekly – 15 October 2019: Securing the internet of things

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

  • The Top Automated Bot Threats to Applications and How to Stop Them

    Sponsored by: Radware

    Today, malicious bots compromise of 26% of total internet traffic. Bots scour the internet, and bypass traditional security methods in order to attack online businesses. So, how can your organization be better equipped to handle this threat? Download this white paper to uncover the top threat tactics & how to mitigate them.

  • CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase

    Sponsored by: ComputerWeekly.com

    Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.

  • Protecting Your Organization with Strong Security Controls

    Sponsored by: OneNeck IT

    The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.

  • Computer Weekly – 14 January 2020: Building the internet of the future

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, Cisco unveils the $5bn platform that it believes will be the future of the internet – we look through the details. The McLaren Formula One team discusses how IoT and data analytics have been key to its revival on the track. And we examine the importance of diversity in software development. Read the issue now.

  • Computer Weekly – 15 October 2019: Securing the internet of things

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Sponsored by: Menlo Security

    Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • Proving ownership of IPv6 addresses

    Sponsored by: ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • Rethinking the Cyber Security of Consumer Internet of Things

    Sponsored by: ComputerWeekly.com

    The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions.

  • What's Threatening IT Security?

    Sponsored by: Aruba Networks

    What are the causes of gaps in IT security? Is the Internet of Things making it worse? Can AI and automation fix it? Download this resource to see what the Ponemon Institute recently found.

  • CW Middle East ezine October 2018

    Sponsored by: ComputerWeekly.com

    It's still early days for the Middle East when it comes to artificial intelligence and robotic process automation, but things are picking up.

  • CW Benelux May 2018

    Sponsored by: ComputerWeekly.com

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

  • CW ASEAN: SD-WAN helps find best route to cloud

    Sponsored by: ComputerWeekly.com

    This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.

  • CW ANZ: OpenStack gains a foothold in Australia

    Sponsored by: ComputerWeekly.com

    OpenStack's popularity has increased across the globe. A 2017 survey has revealed a 44% increase in OpenStack deployments compared to a year earlier – and 74% of all deployments occurred outside the U.S. In this issue of CW ANZ, we look at how OpenStack has changed the way Australian enterprises operate their IT infrastructure.

  • CW Europe – March 2018

    Sponsored by: ComputerWeekly.com

    Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.

  • The next wave of IoT in Asia: What to expect in 2018

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.

  • World Economic Forum Global Risks Report 2018

    Sponsored by: ComputerWeekly.com

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

  • CW Middle East Jan to Mar 2018

    Sponsored by: ComputerWeekly.com

    The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.