ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Top 10 cyber security stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.

  • Dutch organisations demand more from government

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

  • Who should get the technology vote in the UK General Election?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.

  • CW Benelux November 2019-January 2020: Dutch banks fight money laundering

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.

  • Application security: best practices and risks

    Sponsored by: TechTarget ComputerWeekly.com

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

  • VMs vs. containers: Which is better for security?

    Sponsored by: TechTarget ComputerWeekly.com

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • Infographic: 5 ways to achieve a risk-based security strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: TechTarget ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • Proactive Security: Software vulnerability management and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

  • Infographic: 2019 Europe IT Priorities - Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • How long does it take to get owned?

    Sponsored by: TechTarget ComputerWeekly.com

    A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: TechTarget ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • CW APAC buyer's guide to cloud security

    Sponsored by: TechTarget ComputerWeekly.com

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

  • Infographic: 6 emerging trends in security

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.

  • Recap: Splunk.conf 18

    Sponsored by: TechTarget ComputerWeekly.com

    Download this e-guide for coverage of Splunk.conf 2018, looking into subjects such as security automation, data-driven pre-emptive maintenance and why diversity is so important when developing the technologies of the future.

  • Jargon Buster Guide to Post Quantum Cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

  • Containers: Making security and business sense

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.

  • CW ASEAN: Defend against disruption

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

  • CW ANZ: Fix the weak links

    Sponsored by: TechTarget ComputerWeekly.com

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

  • How to Modernize Your Vulnerability Management Program

    Sponsored by: ServiceNow

    Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • SOAR vs. SIEM: Commonalities and Differences

    Sponsored by: ServiceNow

    While some IT shops could get away with using a SIEM or a SOAR tool, they are best deployed as complementary products. Although these tools have major commonalities, they also have distinct differences. In this e-guide, learn all about the key similarities and differences in SIEM and SOAR.

  • How to Improve Your Security Incident Response Process

    Sponsored by: ServiceNow

    Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.

  • The Benefits of Automating Security with SOAR Tools

    Sponsored by: ServiceNow

    Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.