Security Architectures Research
-
CISO Success Stories: How security leaders are tackling evolving cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
-
CW EMEA - November 2023: Let the data flow
Sponsored by: TechTarget ComputerWeekly.comIn this month's CW EMEA ezine, we find out about Heineken's mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform. Read the issue now.
-
MicroScope – April 2023: The benefits of security accreditations
Sponsored by: MicroScopeIn this month's MicroScope ezine, we look at how industry-recognised certifications can strengthen business defences. We also see how ChatGPT offers the channel a chance to level the playing field. Read the issue now.
-
Business email compromise prevention tips
Sponsored by: TechTarget ComputerWeekly.comIt's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
-
Comparing Azure Active Directory options
Sponsored by: TechTarget ComputerWeekly.comLike Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
-
Identity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comIdentity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
-
AI in Fraud Management: Uses cases, benefits and challenges
Sponsored by: TechTarget ComputerWeekly.comAI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
-
Computer Weekly – 14 February 2023: Where next for NHS IT?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.
-
Multifactor authentication: What are the pros and cons?
Sponsored by: TechTarget ComputerWeekly.comOne of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
-
The ultimate guide to identity & access management
Sponsored by: TechTarget ComputerWeekly.comBusinesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
-
Infographic: 5 cybersecurity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comThe key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
-
Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
-
Royal Holloway: Secure multiparty computation and its application to digital asset custody
Sponsored by: TechTarget ComputerWeekly.comFor this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
-
Trust no one: Why zero trust security is taking the world by storm
Sponsored by: TechTarget ComputerWeekly.comAs zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
-
Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
-
Cyber Security: 2021 Worst in Show
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
How do you solve a problem like security training?
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
-
Security Think Tank: Biden's Cyber Security Plan
Sponsored by: TechTarget ComputerWeekly.comAs Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
-
Chapter 1: Security and Risk Management
Sponsored by: McGraw HillIn this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
Zero trust: Taking back control of IT security
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
Manchester United praised for swift response to cyber attack
Sponsored by: TechTarget ComputerWeekly.comThe Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
-
IT Priorities 2020: After Covid-19, security goes back to basics
Sponsored by: TechTarget ComputerWeekly.comThis year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
A Computer Weekly buyer's guide to supply chain resilience
Sponsored by: TechTarget ComputerWeekly.comThe Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.