ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Computer Weekly – 15 December 2020: How security will be different after Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.

  • 2021 IT Priorities: APAC report

    Sponsored by: TechTarget ComputerWeekly.com

    Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.

  • Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.

  • MicroScope – October 2020: Get in touch with remote network security

    Sponsored by: MicroScope

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

  • GoSecure Cybersecurity Perceptions Versus Reality

    Sponsored by: GoSecure

    This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.

  • SD-WAN: Accelerating network transformation in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.

  • IT/OT convergence is necessary, but not so simple

    Sponsored by: TechTarget ComputerWeekly.com

    This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.

  • Royal Holloway: Purple team playbook – threat modeling for security testing

    Sponsored by: TechTarget ComputerWeekly.com

    The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

  • False cents of security: The price of being compromised

    Sponsored by: TechTarget ComputerWeekly.com

    Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.

  • CIO Trends India

    Sponsored by: TechTarget ComputerWeekly.com

    CIOs in India have been put to the test as their organisations implement remote work arrangements amid the Covid-19 pandemic. We look at the impact of the coronavirus outbreak on India's IT industry, why a pandemic specific BCP matters and how CIOs can harden up their datacentre equipment supply chains post-Covid-19.

  • 9 essential elements of network security

    Sponsored by: TechTarget ComputerWeekly.com

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

  • 5G: APAC guide to next-gen mobile connectivity

    Sponsored by: TechTarget ComputerWeekly.com

    From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.

  • EMEA Emergency Services eBook Network Technologies Transforming Public Safety

    Sponsored by: Cradlepoint

    Emergency services depend on digital and connected technologies to help quickly provide life-saving assistance, deal with emergencies, and bring order to chaotic situations. In this e-book, learn how Cradlepoint helped 5 different emergency service departments stay connected.

  • MicroScope – April 2020: Seeking sustainability in the channel

    Sponsored by: MicroScope

    In this issue, we look at sustainability in the channel, with customers increasingly wanting to know that their reseller has a handle on their carbon footprint. Also, read about SCC's insight on mobile working and workforce security, and take a closer look at Riverbed's return to its roots

  • The Cloud is the New Center of Data

    Sponsored by: Apcela

    Some enterprises have closed down their data centers, but it doesn’t seem likely that another 7 out of 10 enterprise data centers will go offline in just five years. In this brief, learn why a new paradigm is needed to extend the WAN beyond the data center to the multi- and hybrid cloud environment in which the modern enterprise operates.

  • Apcela Arcus Platform: Enterprise Multicloud WAN

    Sponsored by: Apcela

    Apcela Arcus Platform allows enterprises to easily plug their existing network into a SD-WAN that was built for today’s multi-cloud environment. In this brief, learn more about the Apcela Arcus Platform.

  • Top APAC telecoms predictions for 2020

    Sponsored by: TechTarget ComputerWeekly.com

    The 5G bandwagon is the talk of town, but 4G will remain the priority for much of Asia-Pacific, among other key trends that will shape telecoms markets across the region.

  • Top APAC security predictions for 2020

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.

  • Infographic: 2019 Europe IT Priorities - Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • UK IT Priorities 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: TechTarget ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • What to include in an SD-WAN security checklist

    Sponsored by: HPE Aruba Networking

    SD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.