Network Security Research
-
Computer Weekly – 15 December 2020: How security will be different after Covid-19
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
-
2021 IT Priorities: APAC report
Sponsored by: TechTarget ComputerWeekly.comInside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
-
Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.
-
MicroScope – October 2020: Get in touch with remote network security
Sponsored by: MicroScopeIn this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption
-
Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
-
GoSecure Cybersecurity Perceptions Versus Reality
Sponsored by: GoSecureThis 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
-
SD-WAN: Accelerating network transformation in APAC
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
-
IT/OT convergence is necessary, but not so simple
Sponsored by: TechTarget ComputerWeekly.comThis handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
-
Royal Holloway: Purple team playbook – threat modeling for security testing
Sponsored by: TechTarget ComputerWeekly.comThe reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
-
False cents of security: The price of being compromised
Sponsored by: TechTarget ComputerWeekly.comTrying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
-
CIO Trends India
Sponsored by: TechTarget ComputerWeekly.comCIOs in India have been put to the test as their organisations implement remote work arrangements amid the Covid-19 pandemic. We look at the impact of the coronavirus outbreak on India's IT industry, why a pandemic specific BCP matters and how CIOs can harden up their datacentre equipment supply chains post-Covid-19.
-
9 essential elements of network security
Sponsored by: TechTarget ComputerWeekly.comNetwork security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
-
5G: APAC guide to next-gen mobile connectivity
Sponsored by: TechTarget ComputerWeekly.comFrom efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.
-
EMEA Emergency Services eBook Network Technologies Transforming Public Safety
Sponsored by: CradlepointEmergency services depend on digital and connected technologies to help quickly provide life-saving assistance, deal with emergencies, and bring order to chaotic situations. In this e-book, learn how Cradlepoint helped 5 different emergency service departments stay connected.
-
MicroScope – April 2020: Seeking sustainability in the channel
Sponsored by: MicroScopeIn this issue, we look at sustainability in the channel, with customers increasingly wanting to know that their reseller has a handle on their carbon footprint. Also, read about SCC's insight on mobile working and workforce security, and take a closer look at Riverbed's return to its roots
-
The Cloud is the New Center of Data
Sponsored by: ApcelaSome enterprises have closed down their data centers, but it doesn’t seem likely that another 7 out of 10 enterprise data centers will go offline in just five years. In this brief, learn why a new paradigm is needed to extend the WAN beyond the data center to the multi- and hybrid cloud environment in which the modern enterprise operates.
-
Apcela Arcus Platform: Enterprise Multicloud WAN
Sponsored by: ApcelaApcela Arcus Platform allows enterprises to easily plug their existing network into a SD-WAN that was built for today’s multi-cloud environment. In this brief, learn more about the Apcela Arcus Platform.
-
Top APAC telecoms predictions for 2020
Sponsored by: TechTarget ComputerWeekly.comThe 5G bandwagon is the talk of town, but 4G will remain the priority for much of Asia-Pacific, among other key trends that will shape telecoms markets across the region.
-
Top APAC security predictions for 2020
Sponsored by: TechTarget ComputerWeekly.comCyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
-
Infographic: 2019 Europe IT Priorities - Security
Sponsored by: TechTarget ComputerWeekly.comIn this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
-
UK IT Priorities 2019
Sponsored by: TechTarget ComputerWeekly.comThe results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.
-
A Computer Weekly buyer's guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Computer Weekly – 22 January 2019: Moving beyond network boundaries
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
-
What to include in an SD-WAN security checklist
Sponsored by: HPE Aruba NetworkingSD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.
-
Building a Strong and Effective Incident Response Plan
Sponsored by: ServiceNowLiterally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.