ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • MicroScope – May 2022: Charging at SME security challenges

    Sponsored by: MicroScope

    With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

  • Deep learning for countering energy theft – a hybrid long-short term memory approach

    Sponsored by: TechTarget ComputerWeekly.com

    Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.

  • CW Benelux - May-July 2022: Meta shelves hyperscale datacentre plan in Netherlands

    Sponsored by: TechTarget ComputerWeekly.com

    Meta's plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament's call for the government to do everything in its power to stop the facility being built. Read about it in this issue of CW Benelux.

  • Royal Holloway: Cloud-native honeypot deployment

    Sponsored by: TechTarget ComputerWeekly.com

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

  • Royal Holloway: Secure multiparty computation and its application to digital asset custody

    Sponsored by: TechTarget ComputerWeekly.com

    For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.

  • Royal Holloway: Information security of the 2016 Philippine automated elections

    Sponsored by: TechTarget ComputerWeekly.com

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.

  • How to Effectively Close the SecOps Gap

    Sponsored by: BMC

    Managing the balance between security and system performance is challenging due to their different priorities. Take a short survey to access our free whitepaper now on filling the SecOps gap to create effective collaboration between systems.

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Sponsored by: TechTarget ComputerWeekly.com

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

  • Trust no one: Why zero trust security is taking the world by storm

    Sponsored by: TechTarget ComputerWeekly.com

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

  • MicroScope – February 2022: Spotting the hidden security dangers

    Sponsored by: MicroScope

    In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate

  • Top 10 cyber security stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

  • CW Benelux - February-April 2022: Unesco members adopt AI ethics recommendation

    Sponsored by: TechTarget ComputerWeekly.com

    Unesco member state have adopted an AI ethics recommendation that seeks to define a common set of values and principles to guide the development of ethical AI globally. Also read about a large-scale national cyber exercise in the Netherlands.

  • CW APAC: CIO trends

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead

  • Security Think Tank Christmas Special - The most important lessons of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.

  • MicroScope – January 2022: Squaring up to ransomware

    Sponsored by: MicroScope

    In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

  • Computer Weekly - 14 December 2021: The rules for a safer internet

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.

  • MicroScope - December 2021: Valuing the MSP

    Sponsored by: MicroScope

    In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.

  • CW Europe - December 2021-February 2022: Norway embraces internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.

  • CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance

    Sponsored by: TechTarget ComputerWeekly.com

    One Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.

  • Password Security Guidelines

    Sponsored by: Informa TechTarget

    In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.

  • MicroScope – October 2021: Choosing a channel career

    Sponsored by: MicroScope

    In this issue, we explore whether more partners equals better business, and take a closer look at how IT consumption is changing thanks to subscription services. Also read a special feature looking into whether the channel offers good prospects for school-leavers hoping to start on a career path that could make a difference

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.