Security Policies Research
-
CW Nordics August 2019: Copenhagen woos tech startups
Sponsored by: TechTarget ComputerWeekly.comCopenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.
-
CW Middle East ezine April 11 2019
Sponsored by: TechTarget ComputerWeekly.comIt's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
-
Top 10 IT security stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThe discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
Infographic: 6 emerging trends in security
Sponsored by: TechTarget ComputerWeekly.comIn this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
-
Data protection: A business imperative
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
-
Infosec culture: A former helicopter pilot's perspective
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
-
CW ASEAN: Time to dial up defences
Sponsored by: TechTarget ComputerWeekly.comIn this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
-
CW Nordics ezine February 2018
Sponsored by: TechTarget ComputerWeekly.comIn the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
-
CW Benelux February 2018
Sponsored by: TechTarget ComputerWeekly.comIn this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
-
Computer Weekly – 30 January 2018: Davos debates global tech risks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
-
CIO Trends #6: Nordics
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
-
CW Europe – December 2017
Sponsored by: TechTarget ComputerWeekly.comIn this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
-
Web security: Important but often overlooked
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
SME security - a business imperative
Sponsored by: TechTarget ComputerWeekly.comA growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
-
Focus: Cyber security in the Nordics
Sponsored by: TechTarget ComputerWeekly.comWith the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
-
European Perceptions, Preparedness and Strategies for IoT Security
Sponsored by: TechTarget ComputerWeekly.comResearch from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
-
Focus: Infosec17
Sponsored by: TechTarget ComputerWeekly.comSecurity technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
-
The currency of trust: why banks and insurers must make customer data safer and more secure
Sponsored by: TechTarget ComputerWeekly.comBanks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
-
Cyber security in the Middle East
Sponsored by: TechTarget ComputerWeekly.comAs organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
-
Focus ASEAN: Security & Digital Transformation
Sponsored by: TechTarget ComputerWeekly.comWith cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
-
Hacking the Human Operating System
Sponsored by: TechTarget ComputerWeekly.comCyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
How to Modernize Your Vulnerability Management Program
Sponsored by: ServiceNowAttackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
-
How to Improve Your Security Incident Response Process
Sponsored by: ServiceNowNearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
-
The Benefits of Automating Security with SOAR Tools
Sponsored by: ServiceNowSecurity professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.