ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.

  • GoSecure Cybersecurity Perceptions Versus Reality

    Sponsored by: GoSecure

    This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.

  • Australia's cybersecurity game plan

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

  • A Computer Weekly buyer's guide to artificial intelligence in IT security

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • CW ANZ, July 2020: Expert Advice on Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

  • CW APAC, July 2020: Trend Watch: Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.

  • Royal Holloway: Man proposes, fraud disposes

    Sponsored by: TechTarget ComputerWeekly.com

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

  • Making the case for cloud-based security

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

  • Can Lady Gaga and Madonna get people to take security seriously

    Sponsored by: TechTarget ComputerWeekly.com

    What does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. Read more in this PDF.

  • Getting Cloud Security Right

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

  • RSA Conference 2020 guide: Highlighting security's human element

    Sponsored by: TechTarget ComputerWeekly.com

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

  • IT Priorities 2020: APAC

    Sponsored by: TechTarget ComputerWeekly.com

    The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.

  • CW APAC - March 2020: Expert Advice: Security Operations Centre

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.

  • A Computer Weekly buyer's guide to zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.

  • Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.

  • Why zero trust is IT security's best hope

    Sponsored by: TechTarget ComputerWeekly.com

    This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

  • CW Benelux February-April 2020: Ericsson helps driverless buses hit European streets

    Sponsored by: TechTarget ComputerWeekly.com

    Ericsson reveals its plans for new technologies including 5G, the internet of things and automation, including driverless buses.

  • CIO Trends #10: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.

  • CIO Trends #10: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.

  • CIO Trends #10: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.

  • Ponemon - Costs and Consequences of Gaps in Vulnerability Response

    Sponsored by: ServiceNow

    Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.