Security Best Practices Research
-
How long does it take to get owned?
Sponsored by: TechTarget ComputerWeekly.comA study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: TechTarget ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
CW APAC buyer's guide to cloud security
Sponsored by: TechTarget ComputerWeekly.comIn this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
-
Infographic: 6 emerging trends in security
Sponsored by: TechTarget ComputerWeekly.comIn this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
-
Recap: Splunk.conf 18
Sponsored by: TechTarget ComputerWeekly.comDownload this e-guide for coverage of Splunk.conf 2018, looking into subjects such as security automation, data-driven pre-emptive maintenance and why diversity is so important when developing the technologies of the future.
-
Jargon Buster Guide to Post Quantum Cryptography
Sponsored by: TechTarget ComputerWeekly.comThis Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
-
Containers: Making security and business sense
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
-
CW ASEAN: Defend against disruption
Sponsored by: TechTarget ComputerWeekly.comIn this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.
-
CW ANZ: Fix the weak links
Sponsored by: TechTarget ComputerWeekly.comIn this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
-
Application security: More important than ever
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
-
IT Priorities 2018 - What's happening in security?
Sponsored by: TechTarget ComputerWeekly.comIn this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
-
Data protection: A business imperative
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
-
Demystifying the myths of public cloud computing
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
-
Cloud migration: Choosing the right strategy and tools
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.
-
The next wave of IoT in Asia: What to expect in 2018
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.
-
CW Benelux February 2018
Sponsored by: TechTarget ComputerWeekly.comIn this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
-
Cloud: A security risk and opportunity
Sponsored by: TechTarget ComputerWeekly.comWith businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.
-
Web security: Important but often overlooked
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
-
Security Analytics:A popular addition to cyber defence arsenals
Sponsored by: TechTarget ComputerWeekly.comThis e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
-
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
CW Nordics August 2017
Sponsored by: TechTarget ComputerWeekly.comThe Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.
-
SME security - a business imperative
Sponsored by: TechTarget ComputerWeekly.comA growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
-
Focus: Cyber security in the Nordics
Sponsored by: TechTarget ComputerWeekly.comWith the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
-
Cyber Security Trends 2017 ASEAN
Sponsored by: TechTarget ComputerWeekly.comFor a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.