Security Systems Research
-
CW EMEA July 2023: Can we trust AI?
Sponsored by: TechTarget ComputerWeekly.comArtificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
-
A Computer Weekly buyer's guide to secure coding
Sponsored by: TechTarget ComputerWeekly.comSecurity has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.
-
MicroScope – June 2023: Take a balanced approach to security
Sponsored by: MicroScopeIn this issue, read about how to help customers manage their security portfolios in a world of increasingly complex systems, discover how insights are providing more opportunities for partners, and learn whether being an MSP is enjoyable or not
-
CW APAC May 2023 – Expert advice on security and threat intelligence
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
-
Business email compromise prevention tips
Sponsored by: TechTarget ComputerWeekly.comIt's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
-
Multifactor authentication: What are the pros and cons?
Sponsored by: TechTarget ComputerWeekly.comOne of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
-
MicroScope – February 2023: Opportunities in security
Sponsored by: MicroScopeIn this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
-
MITRE ATT&CK: Climb to the top
Sponsored by: TechTarget ComputerWeekly.comThe purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
-
Royal Holloway: Cloud-native honeypot deployment
Sponsored by: TechTarget ComputerWeekly.comExploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
-
MicroScope – February 2022: Spotting the hidden security dangers
Sponsored by: MicroScopeIn this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
-
Top 10 cyber security stories of 2021
Sponsored by: TechTarget ComputerWeekly.comCyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
-
Security Think Tank Christmas Special - The most important lessons of 2021
Sponsored by: TechTarget ComputerWeekly.comIn this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
-
How To Build A Micro-segmentation Strategy
Sponsored by: IllumioDownload this white paper to learn how to build an effective micro-segmentation strategy including identifying high-value assets, mapping your application dependencies and enrich with vulnerability data, understanding the types of segmentation for security, and more.
-
CW APAC, October 2021: Tech Career Guide
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region
-
MicroScope – October 2021: Choosing a channel career
Sponsored by: MicroScopeIn this issue, we explore whether more partners equals better business, and take a closer look at how IT consumption is changing thanks to subscription services. Also read a special feature looking into whether the channel offers good prospects for school-leavers hoping to start on a career path that could make a difference
-
Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
-
Cyber Security: 2021 Worst in Show
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: TechTarget ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
CW Middle East - April-June 2021: Qatari financial services regulator launches platform to help combat money laundering
Sponsored by: TechTarget ComputerWeekly.comThe Qatar Financial Markets Authority is using a digital platform to enable financial services professionals to assess their knowledge of anti-money laundering and combating the financing of terrorism.
-
Evaluating Data-centric Protection Solutions
Sponsored by: Comforte AGData is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
-
Cyber Security: 2021 Worst in Show
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: TechTarget ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.