Security Industry Research
-
MicroScope – February 2023: Opportunities in security
Sponsored by: MicroScopeIn this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
-
MicroScope – February 2022: Spotting the hidden security dangers
Sponsored by: MicroScopeIn this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
-
Simplify your security operations (e-book)
Sponsored by: Red Hat77% of organizations plan to implement automation to speed up security response times. Does yours? Dive into this e-book to learn about the benefits of an automation platform and how you can simplify your security operations center.
-
Cyber Security: 2021 Worst in Show
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
How do you solve a problem like security training?
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: TechTarget ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
Security Think Tank: Biden's Cyber Security Plan
Sponsored by: TechTarget ComputerWeekly.comAs Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
-
Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
Sponsored by: TechTarget ComputerWeekly.comIn this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
-
7 Experts on Transitioning to MDR
Sponsored by: GoSecureManaged detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
-
Security And Compliance Automation For Financial Services
Sponsored by: Red HatA SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
-
SIG - SASE in 15 minutes
Sponsored by: Cisco SecureSecure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
-
Evaluating Data-centric Protection Solutions
Sponsored by: Comforte AGData is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
-
Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
-
Tech-Savvy English Public School Streamlines Office 365 Security
Sponsored by: BarracudaDownload this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
-
CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
Sponsored by: BarracudaTune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
-
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Sponsored by: BarracudaDownload this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
-
Cyber Security: 2021 Worst in Show
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: TechTarget ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
How do you solve a problem like security training?
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
-
Security Think Tank: Biden's Cyber Security Plan
Sponsored by: TechTarget ComputerWeekly.comAs Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
-
Zero trust: Taking back control of IT security
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
-
Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
Manchester United praised for swift response to cyber attack
Sponsored by: TechTarget ComputerWeekly.comThe Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
-
Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.