Security Infrastructure Research
-
Royal Holloway: Cloud-native honeypot deployment
Sponsored by: ComputerWeekly.comExploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
-
Transforming risk Why digital transformation depends on integrated risk management
Sponsored by: ServiceNowEmbarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.
-
All together now
Sponsored by: ServiceNow2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
-
CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres
Sponsored by: ComputerWeekly.comImperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
-
CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
Sponsored by: ComputerWeekly.comComo o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
-
Trust no one: Why zero trust security is taking the world by storm
Sponsored by: ComputerWeekly.comAs zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
-
Infographic: SIEM vs. SOAR vs. XDR
Sponsored by: ComputerWeekly.comIT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
-
MicroScope – February 2022: Spotting the hidden security dangers
Sponsored by: MicroScopeIn this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
-
CW APAC: CIO trends
Sponsored by: ComputerWeekly.comIn this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead
-
MicroScope – January 2022: Squaring up to ransomware
Sponsored by: MicroScopeIn this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead
-
The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *
Sponsored by: BitdefenderEndpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
-
The SIEM Buyer's Guide for 2021
Sponsored by: SplunkSIEM has become a core component of modern cybersecurity programs – enabling organizations to detect and act on threats before they strike. The following SIEM buyer’s guide provides a deep dive into the evolution of SIEM, its essential features, key capabilities and what the 2021 SIEM landscape looks like – read on to get started.
-
The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
Sponsored by: ProofpointWith 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
-
SIMPLIFIED RACF MANAGEMENT
Sponsored by: Beta SystemsAccess this data sheet from Beta Systems to learn about _beta access for RACF, a solution that delivers simple administration, monitoring, and auditing of your z/OS security system, replacing the costly tools you use today while providing the same functionality.
-
Six Myths of SIEM
Sponsored by: IBMTraditionally, SIEM solutions were complex and targeted towards larger organizations. But with the need for security solutions ever-increasing, progressive SIEM vendors cater to businesses of all sizes.In this white paper, uncover the top 6 myths about SIEM and what organizations should expect from SIEM today. Read on to learn more.
-
Cyber Security: 2021 Worst in Show
Sponsored by: ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
MicroScope – October 2021: Choosing a channel career
Sponsored by: MicroScopeIn this issue, we explore whether more partners equals better business, and take a closer look at how IT consumption is changing thanks to subscription services. Also read a special feature looking into whether the channel offers good prospects for school-leavers hoping to start on a career path that could make a difference
-
A Computer Weekly buyer's guide to SIEM and SOAR
Sponsored by: ComputerWeekly.comThe question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
-
Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
How do you solve a problem like security training?
Sponsored by: ComputerWeekly.comIn this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
-
Security Think Tank: Biden's Cyber Security Plan
Sponsored by: ComputerWeekly.comAs Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
-
Zero trust: Taking back control of IT security
Sponsored by: ComputerWeekly.comIn this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
-
Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
Sponsored by: ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.