ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • HCL AppScan

    Sponsored by: HCL Software

    The past few years have only put more pressure on already overburdened AppSec teams. Large organizations manage thousands of applications, but the task of managing security typically falls on the shoulders of a small, under-resourced team. In this guide, learn how to expand application security testing with fewer resources. Get started here.

  • Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies

    Sponsored by: ComputerWeekly.com

    This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.

  • CW Middle East - July-September 2022: UAE citizens embrace new digital technologies

    Sponsored by: ComputerWeekly.com

    A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.

  • Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.

  • Royal Holloway: Corporate under-reporting of cyber crime

    Sponsored by: ComputerWeekly.com

    Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.

  • Popular Security Best Practices for Hybrid Cloud

    Sponsored by: Dell Brand Study

    Combining a public cloud and an on-premises environmentcreates unfamiliar security challenges. Learn the main securityissues in hybrid cloud and the ways to combat them.

  • Royal Holloway: Attack mapping for the internet of things

    Sponsored by: ComputerWeekly.com

    The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.

  • MicroScope – May 2022: Charging at SME security challenges

    Sponsored by: MicroScope

    With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

  • MITRE ATT&CK: Climb to the top

    Sponsored by: ComputerWeekly.com

    The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.

  • Deep learning for countering energy theft – a hybrid long-short term memory approach

    Sponsored by: ComputerWeekly.com

    Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.

  • CW Benelux - May-July 2022: Meta shelves hyperscale datacentre plan in Netherlands

    Sponsored by: ComputerWeekly.com

    Meta's plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament's call for the government to do everything in its power to stop the facility being built. Read about it in this issue of CW Benelux.

  • Royal Holloway: Cloud-native honeypot deployment

    Sponsored by: ComputerWeekly.com

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

  • Royal Holloway: Secure multiparty computation and its application to digital asset custody

    Sponsored by: ComputerWeekly.com

    For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.

  • Transforming risk Why digital transformation depends on integrated risk management

    Sponsored by: ServiceNow

    Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.

  • All together now

    Sponsored by: ServiceNow

    2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.

  • Royal Holloway: Information security of the 2016 Philippine automated elections

    Sponsored by: ComputerWeekly.com

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres

    Sponsored by: ComputerWeekly.com

    Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.

  • Five Scenarios That Waste Your Cybersecurity Training Budget

    Sponsored by: CyberVista

    This website post examines 5 expensive cybersecurity training missteps companies have made, even as budgets rises to keep pace with the evolving threat landscape. Keep reading to learn how to make your training dollars go further with the right cybersecurity workforce strategy.

  • Ransomware: A Look At The Criminal Art Of Malicious Code, Pressure, And Manipulation

    Sponsored by: ESET

    As ransomware wreaks havoc across all industries, it’s important to consider how you can reduce your exposure to ransomware attacks and limit the damage when they do happen. Explore this white paper to learn how you can protect and control these 3 different ransomware attack vectors: remote access, email, and the supply chain.

  • A Better Replacement For The Incumbent Training Model

    Sponsored by: CyberVista

    While cybersecurity bootcamps are popular ways to certify and train employees, they tend to lack competence testing and long-term skills retention. Explore this website post to learn how some online training models are conquering the shortcomings of the bootcamp model and discover how these training models map directly to your needs.

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Sponsored by: ComputerWeekly.com

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    Sponsored by: ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.