ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Computer Weekly – 8 January 2019: Technology innovation in music

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.

  • Computer Weekly – 16 October 2018: Drilling into AI at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

  • Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.

  • Network Security: Spotlight on Australia/New Zealand

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

  • Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.

  • Software-defined networking: Spotlight on ASEAN

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the state of adoption of Software-defined networking (SDN) in the ASEAN, how the technology can be used to secure critical systems and what you can do to get started.

  • Next generation network security

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.

  • Essential Guide: Securing hybrid IT infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

  • Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.

  • Focus ASEAN: Next-generation networks

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the concept of autonomous self-driving networks, how the IoT connectivity wars are playing out and why Asia is set to dominate industry conversations on 5G.

  • Print security: An imperative in the IoT era

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

  • Focus: Network security

    Sponsored by: TechTarget ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • Towards more robust internetworks

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.

  • Computer Weekly – 25 October 2016: 25 years of Linux

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

  • Guide to Flexible Working

    Sponsored by: TechTarget ComputerWeekly.com

    This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.

  • How to get actionable threat intelligence from tech tools

    Sponsored by: TechTarget Security

    Automated threat intel products and services can't produce actionable threat intelligence without essential ingredients, like threat hunters, analysts and administrators. This guide teaches cybersecurity pros how to how to pluck usable threat intelligence from a sea of data.

  • Network Performance Issues are IT Pain Point Amid COVID-19

    Sponsored by: NetAlly

    Reliable home network performance is a top issue IT teams have dealt with amid the COVID-19 pandemic. With almost entire workforces working from disparate locations, remote networks are nearly impossible to monitor and manage. In this e-guide, learn how home network performance issues can relate to other IT problems.

  • Can a SASE architecture deliver better network performance?

    Sponsored by: TechTarget Networking

    Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.

  • What to Include in an SD-WAN Security Checklist

    Sponsored by: TATA Communications

    Ensuring security in a software-defined WAN implementation is crucial, but it's often easier said than done. The SD-WAN security equation comprises multiple variables. In this e-guide, uncover 4 different areas where enterprises should consider SD-WAN and security, as well as the core capabilities to include in an SD-WAN security checklist.

  • How IAM Systems Support Compliance

    Sponsored by: Beta Systems

    Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.

  • 9 essential elements of network security

    Sponsored by: TechTarget ComputerWeekly.com

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

  • Why You Should Consider Endpoint Detection & Response

    Sponsored by: Claranet

    Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.

  • Why you Should Consider SASE for SD-WAN

    Sponsored by: Fortinet, Inc.

    SD-WAN is revolutionizing the way employees connect to their networks. And this is great, but much of what SD-WAN has to offer can be improved with the implementation of a SASE architecture. Dive into this e-guide to get the scoop on why SD-WAN and SASE go together like PB&J.

  • What to Include in an SD-WAN Security Checklist

    Sponsored by: Citrix

    SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.