ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Five Scenarios That Waste Your Cybersecurity Training Budget

    Sponsored by: CyberVista

    This website post examines 5 expensive cybersecurity training missteps companies have made, even as budgets rises to keep pace with the evolving threat landscape. Keep reading to learn how to make your training dollars go further with the right cybersecurity workforce strategy.

  • A Better Replacement For The Incumbent Training Model

    Sponsored by: CyberVista

    While cybersecurity bootcamps are popular ways to certify and train employees, they tend to lack competence testing and long-term skills retention. Explore this website post to learn how some online training models are conquering the shortcomings of the bootcamp model and discover how these training models map directly to your needs.

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Sponsored by: ComputerWeekly.com

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    Sponsored by: ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

  • Trust no one: Why zero trust security is taking the world by storm

    Sponsored by: ComputerWeekly.com

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

  • Accelerating Green Datacenter Progress with Sustainable Storage Strategies

    Sponsored by: FUJIFILM Corporation, Recording Media

    The opportunity exists to disrupt the escalation of energy consumption and waste by the storage infrastructure, improving long-term sustainability, and cost-efficiency, goals. Download this IDC report to examine several sustainable storage strategies.

  • PCI and GDPR Data Protection Requirements Met with Zero Downtime

    Sponsored by: Comforte AG

    Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.

  • MicroScope – February 2022: Spotting the hidden security dangers

    Sponsored by: MicroScope

    In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate

  • Blueprint to SecuringAuthentication & Authorization in 2022

    Sponsored by: Beta Systems

    Remote/hybrid work and cloud adoption have created the perfect recipe for the never-ending bombardment of phishing and ransomware attacks organizations face today. Download this e-guide to learn about 5 IAM trends shaping the future of security, 10 IAM tools to protect your network and more.

  • Top 10 cyber security stories of 2021

    Sponsored by: ComputerWeekly.com

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

  • CW Benelux - February-April 2022: Unesco members adopt AI ethics recommendation

    Sponsored by: ComputerWeekly.com

    Unesco member state have adopted an AI ethics recommendation that seeks to define a common set of values and principles to guide the development of ethical AI globally. Also read about a large-scale national cyber exercise in the Netherlands.

  • Major Oil Company Chooses Tokenization to Achieve PCI Compliance

    Sponsored by: Comforte AG

    A large oil company responsible for a vast POS network spanning 14,000 gas stations was struggling to achieve PCI compliance. After searching for a new tool, the organization decided to implement SecurDPS. Find out why they chose SecurDPS and the benefits they experienced after installation in this case study.

  • The Impact of XDR in the Modern SOC

    Sponsored by: Dell SecureWorks

    Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.

  • CW APAC: CIO trends

    Sponsored by: ComputerWeekly.com

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead

  • Security Think Tank Christmas Special - The most important lessons of 2021

    Sponsored by: ComputerWeekly.com

    In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.

  • MicroScope – January 2022: Squaring up to ransomware

    Sponsored by: MicroScope

    In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

  • The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *

    Sponsored by: Bitdefender

    Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.

  • The Total Economic Impact™ Of Secureworks®Taegis™ Managedxdr

    Sponsored by: Dell SecureWorks

    Secureworks Taegis ManagedXDR delivers security analytics software, 24/7 analyst investigation, threat hunting, and incident response in a single solution. Download this Forrester report to see what Secureworks customers have to say about their experience using ManagedXDR and the ROI and business benefits from Forrester.

  • Everything You Need to Know About the Log4j Vulnerability

    Sponsored by: TechTarget

    Here, dig into the origins of the Log4J vulnerability, the severity, and what needs to change to ensure enterprise systems aren't at risk in the future.

  • Computer Weekly - 14 December 2021: The rules for a safer internet

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.

  • MicroScope - December 2021: Valuing the MSP

    Sponsored by: MicroScope

    In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.

  • CW Europe - December 2021-February 2022: Norway embraces internet of things

    Sponsored by: ComputerWeekly.com

    Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.

  • Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms

    Sponsored by: Schneider Electric

    Enter this whitepaper to learn about the security aspects that go into developing and operating digital, cloud-based remote monitoring platforms built to keep data private and infrastructure systems secure from attackers.

  • Driving Real Behaviour Change

    Sponsored by: Proofpoint

    There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.

  • 18 Windows 10 Facts IT Must Know

    Sponsored by: VMware

    Now that Windows 10 has gone through some ups and downs, and has seen a fourth significant upgrade, it is time to see what we know about Windows 10 as it stands right now.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.