Security Research
-
Centralized vs. decentralized identity management explained
Sponsored by: TechTarget ComputerWeekly.comIn this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.
-
Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.
-
AI in Fraud Management: Uses cases, benefits and challenges
Sponsored by: TechTarget ComputerWeekly.comAI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
-
MicroScope – March 2023: Steering the storage market
Sponsored by: MicroScopeIn this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.
-
Computer Weekly – 14 February 2023: Where next for NHS IT?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.
-
Multifactor authentication: What are the pros and cons?
Sponsored by: TechTarget ComputerWeekly.comOne of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
-
MicroScope – February 2023: Opportunities in security
Sponsored by: MicroScopeIn this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
-
A Computer Weekly buyer's guide to anti-ransomware
Sponsored by: TechTarget ComputerWeekly.comThe threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
-
CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off
Sponsored by: TechTarget ComputerWeekly.comFinland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.
-
CW Nordics - November 2022 - January 2023: Icelandic datacentres point way to greener IT
Sponsored by: TechTarget ComputerWeekly.comIceland may soon become even more attractive to firms wanting to minimise their carbon footprint while using high-performance computing services. Read more about it in this issue. Also find out how a robo investment company, Nord Investments, is harnessing open banking to make thing easier for its clients.
-
CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital
Sponsored by: TechTarget ComputerWeekly.comHeineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.
-
How to get started with SASE
Sponsored by: TechTarget ComputerWeekly.comImplementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.
-
CW APAC: Trend Watch: Cloud networking
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
-
CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT
Sponsored by: TechTarget ComputerWeekly.comFaced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.
-
7 best practices for Web3 security risk mitigation
Sponsored by: TechTarget ComputerWeekly.comWeb3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.
-
CW Nordics - August-October 2022: Norway struggles to keep up with demand for tech specialists
Sponsored by: TechTarget ComputerWeekly.comThe growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies.
-
A Computer Weekly buyer's guide to cyber insurance
Sponsored by: TechTarget ComputerWeekly.comIn this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
-
A Computer Weekly buyer's guide to supply chain security
Sponsored by: TechTarget ComputerWeekly.comOrganisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.
-
Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
Sponsored by: TechTarget ComputerWeekly.comThis article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
-
CW Middle East - July-September 2022: UAE citizens embrace new digital technologies
Sponsored by: TechTarget ComputerWeekly.comA survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.
-
Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.
-
Royal Holloway: Corporate under-reporting of cyber crime
Sponsored by: TechTarget ComputerWeekly.comWithout reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
-
Royal Holloway: Attack mapping for the internet of things
Sponsored by: TechTarget ComputerWeekly.comThe introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
-
Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
-
Computer Weekly – 7 February 2023: Making IT security training stick
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our buyer's guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors. Read the issue now.