Security Policies Research
-
In 2017, the insider threat epidemic begins
Sponsored by: TechTarget ComputerWeekly.comCyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
-
Are we trusting social networks too much?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
Financial markets regulatory outlook 2017
Sponsored by: TechTarget ComputerWeekly.comFinancial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
-
Protecting your organisation from itself
Sponsored by: TechTarget ComputerWeekly.comThis report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
-
Focus: Securing for the future
Sponsored by: TechTarget ComputerWeekly.com2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
-
Computer Weekly: Data Danger
Sponsored by: TechTarget ComputerWeekly.comIn this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?
-
CW Europe: December 2016 - February 2017
Sponsored by: TechTarget ComputerWeekly.comSecurity continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
-
Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
-
Trouble at your door: targeted cyber attacks in the UK and Europe
Sponsored by: TechTarget ComputerWeekly.comThis research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
-
Policing cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
-
Focus: IT Security in the Middle East
Sponsored by: TechTarget ComputerWeekly.comIn this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
-
Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
Sponsored by: TechTarget ComputerWeekly.comIn this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Cyber Security 2016 and beyond
Sponsored by: TechTarget ComputerWeekly.comCyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits
Sponsored by: TechTarget ComputerWeekly.comTech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.
-
What to Include in an SD-WAN Security Checklist
Sponsored by: TATA CommunicationsEnsuring security in a software-defined WAN implementation is crucial, but it's often easier said than done. The SD-WAN security equation comprises multiple variables. In this e-guide, uncover 4 different areas where enterprises should consider SD-WAN and security, as well as the core capabilities to include in an SD-WAN security checklist.
-
How IAM Systems Support Compliance
Sponsored by: Beta SystemsMany organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
-
5 IAM Trends Shaping the Future of Security
Sponsored by: Beta SystemsModern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
-
Incident Response Tools: How, When & Why to Use Them
Sponsored by: ClaranetIncident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
-
Kaspersky Lab’s COVID-19 Relief Initiatives
Sponsored by: KasperskyAmid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
-
Employ AI for Cybersecurity, Reap Strong Defenses Faster
Sponsored by: TechTarget SecurityAdversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.
-
Security Access Controls Over Identities Must Be Priority
Sponsored by: TechTarget SecurityNo company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
-
Assess Secure Web Gateways to Suit Your Network Security Needs
Sponsored by: TechTarget SecuritySecure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
-
Configuration Management: Addressing GRC Challenges
Sponsored by: ServiceNowConfiguration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).
-
Top 10 IT security stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThe discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.