Security Best Practices Research
-
The CISO's guide to supply chain security
Sponsored by: TechTarget ComputerWeekly.comSupply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
-
Cyber Security: 2021 Worst in Show
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
How do you solve a problem like security training?
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: TechTarget ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
Security Think Tank: Biden's Cyber Security Plan
Sponsored by: TechTarget ComputerWeekly.comAs Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
-
Royal Holloway: Protecting investors from cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
-
Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
-
Chapter 1: Security and Risk Management
Sponsored by: McGraw HillIn this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
MicroScope – February 2021: The forecast on channel security
Sponsored by: MicroScopeMicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
-
Zero trust: Taking back control of IT security
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
Sponsored by: TechTarget ComputerWeekly.comIn this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
-
IT Priorities 2020: After Covid-19, security goes back to basics
Sponsored by: TechTarget ComputerWeekly.comThis year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
-
Australia's cybersecurity game plan
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
-
A Computer Weekly buyer's guide to artificial intelligence in IT security
Sponsored by: TechTarget ComputerWeekly.comArtificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
CW ANZ, July 2020: Expert Advice on Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
CW APAC, July 2020: Trend Watch: Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
-
Royal Holloway: Man proposes, fraud disposes
Sponsored by: TechTarget ComputerWeekly.comIn May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Making the case for cloud-based security
Sponsored by: TechTarget ComputerWeekly.comCloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
-
Can Lady Gaga and Madonna get people to take security seriously
Sponsored by: TechTarget ComputerWeekly.comWhat does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. Read more in this PDF.
-
Getting Cloud Security Right
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.