ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • How do you solve a problem like security training?

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.

  • Security Think Tank: Critical National Infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

  • Security Think Tank: Biden's Cyber Security Plan

    Sponsored by: TechTarget ComputerWeekly.com

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

  • Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers

    Sponsored by: TechTarget ComputerWeekly.com

    In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act

  • Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • SIEM, SOAR or both? Our security experts weigh in

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.

  • GoSecure Cybersecurity Perceptions Versus Reality

    Sponsored by: GoSecure

    This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.

  • Australia's cybersecurity game plan

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

  • Royal Holloway: Man proposes, fraud disposes

    Sponsored by: TechTarget ComputerWeekly.com

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

  • CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits

    Sponsored by: TechTarget ComputerWeekly.com

    Tech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.

  • RSA Conference 2020 guide: Highlighting security's human element

    Sponsored by: TechTarget ComputerWeekly.com

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • CW Europe - March-May 2020: Experts examine Dutch government's IT problems

    Sponsored by: TechTarget ComputerWeekly.com

    Technology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.

  • Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.

  • Why zero trust is IT security's best hope

    Sponsored by: TechTarget ComputerWeekly.com

    This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

  • CIO Trends #10: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.

  • Dutch organisations demand more from government

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

  • CW Europe December 2019: Deutsche Bank creates innovation division

    Sponsored by: TechTarget ComputerWeekly.com

    German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.

  • Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.

  • Ponemon - Costs and Consequences of Gaps in Vulnerability Response

    Sponsored by: ServiceNow

    Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.

  • How to Improve Your Security Incident Response Process

    Sponsored by: ServiceNow

    Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.