Security Management Research
-
Protecting Business and Remote Workers from Covid-19 Email Threats
Sponsored by: BarracudaThe recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
-
Computer Weekly - 7 April 2020: Adapting IT to the new normal
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
-
Enable and Secure Remote Work During the COVID-19 Pandemic
Sponsored by: BarracudaThe recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.
-
How Do Vulnerabilities Get Into Software?
Sponsored by: Veracode, Inc.Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
-
Tech-Savvy English Public School Streamlines Office 365 Security
Sponsored by: BarracudaDownload this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
-
CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
Sponsored by: BarracudaTune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
-
Computer Weekly – 1 October 2019: The most influential women in UK technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.
-
Computer Weekly - 10-16 September 2019: A tech boost for social care
Sponsored by: TechTarget ComputerWeekly.comIn this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
-
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Sponsored by: BarracudaDownload this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
-
Spear Phishing: Top Threats and Trends Vol. 1
Sponsored by: BarracudaThis report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
-
Employees Behaving Badly? Why Awareness Training Matters
Sponsored by: MimecastEmployee behavior and the culture you influence greatly impact the effectiveness of your overall cyber resilience strategy. Read on for 6 ways you can make security awareness apart of your organization's culture.
-
MicroScope – February 2021: The forecast on channel security
Sponsored by: MicroScopeMicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
2021 IT Priorities: APAC report
Sponsored by: TechTarget ComputerWeekly.comInside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
-
Manchester United praised for swift response to cyber attack
Sponsored by: TechTarget ComputerWeekly.comThe Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
-
IT Priorities 2020: After Covid-19, security goes back to basics
Sponsored by: TechTarget ComputerWeekly.comThis year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
Preventing identity theft in a data breach
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
Building a Strong and Effective Incident Response Plan
Sponsored by: ServiceNowLiterally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
-
How to Modernize Your Vulnerability Management Program
Sponsored by: ServiceNowAttackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
-
How to Improve Your Security Incident Response Process
Sponsored by: ServiceNowNearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
-
The Benefits of Automating Security with SOAR Tools
Sponsored by: ServiceNowSecurity professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
-
How IAM Systems Support Compliance
Sponsored by: Beta SystemsMany organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
-
5 IAM Trends Shaping the Future of Security
Sponsored by: Beta SystemsModern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
-
Computer Weekly - 7 April 2020: Adapting IT to the new normal
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.