ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • CIO Trends #10: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.

  • CIO Trends #10: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.

  • CIO Trends #10: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.

  • Top 10 enterprise IT in the Benelux region stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.

  • Top 10 cyber security stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.

  • Data protection, a live issue that affects us all

    Sponsored by: TechTarget ComputerWeekly.com

    Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.

  • Dutch organisations demand more from government

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

  • A Computer Weekly buyer's guide to robotic process automation

    Sponsored by: TechTarget ComputerWeekly.com

    Robotic process automation is making its business value known in a variety of ways. In this 15-page buyer's guide, Computer Weekly looks at how how the market is ever-evolving, the security risks to guard against, and how RPA can spearhead a firm's digital transformation

  • Application security: best practices and risks

    Sponsored by: TechTarget ComputerWeekly.com

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

  • A Computer Weekly buyer's guide to blockchain technology

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • VMs vs. containers: Which is better for security?

    Sponsored by: TechTarget ComputerWeekly.com

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • Infographic: 5 ways to achieve a risk-based security strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.

  • CW Nordics August 2019: Copenhagen woos tech startups

    Sponsored by: TechTarget ComputerWeekly.com

    Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.

  • CW ASEAN: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

  • Proactive Security: Software vulnerability management and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

  • Top VPNs secretly owned by Chinese firms

    Sponsored by: TechTarget ComputerWeekly.com

    Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.

  • SIEM Tools, Future Tech and How to Prepare for What's Ahead

    Sponsored by: Sumo Logic AWS

    While security tech is evolving, so are the threats. Current IT staffs are feeling overwhelmed and some experts believe AI is the answer. Gartner, however, claims that AI will never be perfect, and SIEM will always need a human touch. In this e-book, look at current SIEM tools, future tech and how to prepare for what’s ahead.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.

  • Configuration Management: Addressing GRC Challenges

    Sponsored by: ServiceNow

    Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).

  • Jargon Buster Guide to Container Security

    Sponsored by: TechTarget ComputerWeekly.com

    The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.

  • Top 10 IT security stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • Why EDR Technologies are Essential for Endpoint Protection

    Sponsored by: TechTarget Security

    While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.

  • A Guide to Joining DevOps and Security

    Sponsored by: Trend Micro, Inc.

    If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.

  • Who Needs Security Orchestration, Automation and Response?

    Sponsored by: TechTarget Security

    Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to boost the security of an organization's systems and data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.