ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.

  • CW Nordics August 2019: Copenhagen woos tech startups

    Sponsored by: TechTarget ComputerWeekly.com

    Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.

  • CIO Trends #9: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue find out how blockchain is being tried out in Saudi Arabia to enable consumers to use their faces and blockchain-based apps to withdraw money from cash machines, rather than inserting PINs. Also, read how the UAE's Etihad Airways is working to use AI to help it better engage with staff and benefit from their knowledge and ideas.

  • CW ANZ: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

  • Infographic: 2019 IT Priorities - Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: TechTarget ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • Proactive Security: Software vulnerability management and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

  • Computer Weekly – 7 May 2019: Nurturing innovation at DWP

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.

  • Packaged services – the global shift towards virtual distribution

    Sponsored by: MicroScope

    In this month's issue, we cover changes in distribution and the challenges being faced by those aiming to add value.

  • Infographic: 2019 Europe IT Priorities - Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • How long does it take to get owned?

    Sponsored by: TechTarget ComputerWeekly.com

    A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: TechTarget ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • CW Middle East ezine April 11 2019

    Sponsored by: TechTarget ComputerWeekly.com

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

  • Jargon Buster Guide to Container Security

    Sponsored by: TechTarget ComputerWeekly.com

    The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.

  • CIO Trends #8

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

  • February ezine: Look to the future

    Sponsored by: MicroScope

    An issue with plenty of predictions about what the year ahead holds for the channel

  • DevSecOps delivers better business

    Sponsored by: TechTarget ComputerWeekly.com

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • Top 10 IT security stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • January ezine: SD-WAN is taking off

    Sponsored by: MicroScope

    There has been plenty of talk about SD-WAN and the moment has arrived where the technology is making money for the channel

  • Top 10 Benelux IT stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands and Belgium might be small in terms of population and land area, but they are leading nations when it comes to the use of technology in society. There are numerous examples of the transformative nature of IT in the Netherlands and Belgium in this top 10, such as plans for autonomous ships and smart city developments.

  • Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub

    Sponsored by: TechTarget ComputerWeekly.com

    This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.

  • CW Europe – December 2018

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.