Security Research
-
Infographic: 2019 IT Priorities - Middle East
Sponsored by: TechTarget ComputerWeekly.comIn this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
-
Biometrics in the enterprise: An opportunity or an ethical minefield?
Sponsored by: TechTarget ComputerWeekly.comIs biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
-
Proactive Security: Software vulnerability management and beyond
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
-
Computer Weekly – 7 May 2019: Nurturing innovation at DWP
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.
-
Packaged services – the global shift towards virtual distribution
Sponsored by: MicroScopeIn this month's issue, we cover changes in distribution and the challenges being faced by those aiming to add value.
-
Infographic: 2019 Europe IT Priorities - Security
Sponsored by: TechTarget ComputerWeekly.comIn this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
-
How long does it take to get owned?
Sponsored by: TechTarget ComputerWeekly.comA study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: TechTarget ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
CW Middle East ezine April 11 2019
Sponsored by: TechTarget ComputerWeekly.comIt's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
-
Multi-pronged approach to cyber security professional development
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
-
Computer Weekly – 5 March 2019: Modernising IT at the Bank of England
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.
-
Jargon Buster Guide to Container Security
Sponsored by: TechTarget ComputerWeekly.comThe definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
-
CIO Trends #8
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.
-
February ezine: Look to the future
Sponsored by: MicroScopeAn issue with plenty of predictions about what the year ahead holds for the channel
-
DevSecOps delivers better business
Sponsored by: TechTarget ComputerWeekly.comFirms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
-
Computer Weekly – 22 January 2019: Moving beyond network boundaries
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
-
Top 10 IT security stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThe discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
January ezine: SD-WAN is taking off
Sponsored by: MicroScopeThere has been plenty of talk about SD-WAN and the moment has arrived where the technology is making money for the channel
-
Top 10 Benelux IT stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThe Netherlands and Belgium might be small in terms of population and land area, but they are leading nations when it comes to the use of technology in society. There are numerous examples of the transformative nature of IT in the Netherlands and Belgium in this top 10, such as plans for autonomous ships and smart city developments.
-
Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
Sponsored by: TechTarget ComputerWeekly.comThis issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
-
CW Europe – December 2018
Sponsored by: TechTarget ComputerWeekly.comDutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
-
Essential Guide: Internet of Things (IoT)
Sponsored by: TechTarget ComputerWeekly.comIn this guide find out about the emerging market the Internet of Things (IoT). Find out advice, read case studies and learn how to manage the massive growth in connected devices and objects.
-
Infographic: 6 emerging trends in security
Sponsored by: TechTarget ComputerWeekly.comIn this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
-
Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
-
CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
Sponsored by: TechTarget ComputerWeekly.comBlockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.