ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • Computer Weekly – 8 January 2019: Technology innovation in music

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.

  • Computer Weekly – 16 October 2018: Drilling into AI at Shell

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

  • Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.

  • Network Security: Spotlight on Australia/New Zealand

    Sponsored by: ComputerWeekly.com

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

  • Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.

  • Software-defined networking: Spotlight on ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the state of adoption of Software-defined networking (SDN) in the ASEAN, how the technology can be used to secure critical systems and what you can do to get started.

  • Next generation network security

    Sponsored by: ComputerWeekly.com

    In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.

  • Explore the Threat Hunting Process

    Sponsored by: SearchSecurity.com

    The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.

  • 2019 Network Security Predictions: Top Trends & Challenges

    Sponsored by: TBNG Consulting

    Read this expert guide to review predicted networking trends for 2019. Also, learn why network security remains a top challenge and how you can properly manage it.

  • SDN & SD-WAN: Transform Network Infrastructure and Security

    Sponsored by: Dimension Data

    In this expert e-guide, CIO and principal analyst John Burke of Nemertes Research discusses what key considerations to keep in mind when updating your network infrastructure and security with SD-WAN.

  • Allure of the threat hunter draws companies large and small

    Sponsored by: SearchSecurity.com

    Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.

  • User behavior analytics tackles cloud, hybrid environments

    Sponsored by: SearchSecurity.com

    In this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.

  • Cryptojacking Attacks May Not Challenge Ransomware Dominance

    Sponsored by: Cisco Umbrella

    Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.

  • How to best secure DNS? There's more than one approach

    Sponsored by: SearchSecurity.com

    The passive DNS approach may be the way to secure DNS in the enterprise. The method employs networks of sensors to monitor the DNS ecosystem for suspicious domain name activity and stop it cold. Learn how passive DNS works in the endless cat-and-mouse IT security game.

  • How SD-WAN is Changing Network Security

    Sponsored by: Cato Networks

    In this expert e-guide, we explore how network security has to change in order to keep up with the evolution of SD-WAN. Find out how some vendors are differentiating their SD-WAN platforms with native security, and read up on how SD-WAN is reshaping the network connectivity landscape.

  • Effective end-user management helps fuel productivity

    Sponsored by: SearchEnterpriseDesktop

    Download this three-part handbook on end user management to take a look at the double-edged nature of many technologies aimed to improve productivity, the potential of companion apps and more.

  • How to Make the Most of your Detection and Response

    Sponsored by: Respond Software

    Learn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.

  • The Evolution of ADC

    Sponsored by: Citrix

    Explore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    Sponsored by: SearchSecurity.com

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

  • What SD-WAN Means for Today's Businesses

    Sponsored by: Verizon

    Learn from Lee Doyle, Principal Analyst at Doyle Research, about how a mature SD-WAN market can bring distributed networks up to speed with simplicity and automation. Then, find out how to exactly tailor SD-WAN for your business needs.

  • Network Evolution: Network Pros Get Smart(er) with Analytics

    Sponsored by: SearchNetworking.com

    In this issue of Network Evolution e-zine, learn why enterprises are turning to big data network analytics tools that leverage machine learning and AI to create meaningful, actionable information that can help enhance network performance.

  • Optimizing Endpoint Security for the Enterprise

    Sponsored by: ConvergeOne

    Given the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.