ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Top 10 cyber crime stories of 2019

    Sponsored by: ComputerWeekly.com

    Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.

  • Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.

  • A Computer Weekly buyer's guide to SIEM and SOAR

    Sponsored by: ComputerWeekly.com

    The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.

  • Privacy as a Strategic Imperative: Grow your business through trust and transparency

    Sponsored by: IBM

    PH

  • Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.

  • Security in the supply chain: Lessons learned from SolarWinds

    Sponsored by: TechTarget

    Explore some of the key lessons we've learned from SolarWinds, and tips for applying them to your supply chain, in our expert guide—which you can download after a brief survey.

  • Security Think Tank: Critical National Infrastructure

    Sponsored by: ComputerWeekly.com

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

  • How do you solve a problem like security training?

    Sponsored by: ComputerWeekly.com

    In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.

  • Security Think Tank: Biden's Cyber Security Plan

    Sponsored by: ComputerWeekly.com

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

  • Modernize and integrate with Cloud Pak for Security

    Sponsored by: IBM

    This IBM landing page provides access to exclusive content that dives deeper into the key capabilities of their cloud security platform, designed to integrate existing security tools and respond to threats faster all while leaving the data where it is. Take this short survey before diving in to explore the integrated security platform.

  • IBM Cloud Pak for Security Demo

    Sponsored by: IBM

    In this IBM Cloud Pak for Security Demo landing page, discover how a security platform can simplify how you work by enabling you to identify and prioritize threat intelligence, respond to threats faster, unify your security operations and more. Take this short survey to access the landing page.

  • Why a Purpose Built MDR is the Answer to your Integration Challenges

    Sponsored by: CyberMaxx

    Even best of breed security products and systems are extremely complex to manage. With this white paper, learn how a modern MDR solution can allow for manageable integrations and orchestration capabilities.

  • 4 Tactics to Protect Against Harmful Ransomware

    Sponsored by: CyberMaxx

    Federal agencies warn organizations to adopt a heightened state of awareness following the rampant ransomware attacks of early 2021. In this white paper, experts share 4 proactive measures you can take to protect your organization. Take this short survey to unlock the tactics.

  • The Top 3 Benefits of SIEM as a Service vs Purchasing Off-The-Shelf

    Sponsored by: CyberMaxx

    While SIEM can still support on-premises workloads, it now allows for prioritize and contextualize alerts to quickly identify and catch threat actors, ultimately saving your healthcare organization valuable time. Access the white paper to learn more.

  • 3 Reasons your Operational Workflows are Suffering

    Sponsored by: CyberMaxx

    Operational workflows for healthcare cybersecurity are complex. With this white paper, find 3 reasons why operational workflows are suffering and how to MDR can help. Take this survey to access the white paper.

  • 3 Key Components of a SOC Why a Hybrid Solution May be Best

    Sponsored by: CyberMaxx

    There are many challenges that come with building a SOC in-house, including finding and retaining IT talent. Read this white paper to explore the 3 key components of a SOC and discover why a hybrid solution may be best.

  • Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.

  • Implementing a secure hybrid cloud using security and compliance automation

    Sponsored by: Red Hat

    Making sure that your hybrid cloud environment is secure is a key goal, and automation enabling holistic DevSecOps is empowering organizations with improved compliance, monitoring, and continuous security. Watch this video to learn how Red Hat Ansible can be used to automate security operations ranging from threat hunting to remediation.

  • Zero trust: Taking back control of IT security

    Sponsored by: ComputerWeekly.com

    In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.

  • Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...

    Sponsored by: ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • SIEM, SOAR or both? Our security experts weigh in

    Sponsored by: ComputerWeekly.com

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Secure SD-WAN & SASE: Your 2021 Guidebook

    Sponsored by: TechTarget

    Is your organization prepared for the coming paradigm shift in security? Is your threat defense as strong as it needs to be? Take our short survey to become a member of SearchSecurity's Content Program, where you'll have access to a litany of professional resources to help you bolster security now and into the future.

  • CW Benelux - August-October 2021: Netherlands sees increase in the number of women opting for an ICT career

    Sponsored by: ComputerWeekly.com

    The IT skills gap in the Netherlands could be about to narrow as more women take up jobs in the sector. Figures from last year revealed that the number of female ICT professionals grew by 6.5%, while the number of male ICT professionals increased by only 1.7%. Read more about it in this issue.

  • A Computer Weekly e-guide to SASE

    Sponsored by: ComputerWeekly.com

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences