ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • A Computer Weekly e-guide to SASE

    Sponsored by: ComputerWeekly.com

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

  • Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment

    Sponsored by: WatchGuard Technologies, Inc.

    MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.

  • Manchester United praised for swift response to cyber attack

    Sponsored by: ComputerWeekly.com

    The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

  • Computer Weekly - 22 June 2021: A new three-year plan for digital government

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.

  • Cyber Security: 2021 Worst in Show

    Sponsored by: ComputerWeekly.com

    In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.

  • How do you solve a problem like security training?

    Sponsored by: ComputerWeekly.com

    In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.

  • Preventing identity theft in a data breach

    Sponsored by: ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • IT Priorites 2020 - After Covid 19 security goes back to basics

    Sponsored by: ComputerWeekly.com

    This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.

  • Security Think Tank: Critical National Infrastructure

    Sponsored by: ComputerWeekly.com

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

  • Security Think Tank: Biden's Cyber Security Plan

    Sponsored by: ComputerWeekly.com

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

  • Why are Acronis Cyber Protection Solutions Threatagnostic?

    Sponsored by: Acronis

    Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.

  • The Forrester Wave™: Static Application Security Testing, Q1 2021

    Sponsored by: Veracode, Inc.

    In this exclusive Forrester Wave report, discover the 12 providers leading static application security testing (SAST), as well as what the next generation of SAST tools are focusing on. Get the details now. Save the report here.

  • IDC Marketscape: Worldwide Managed Security Services 2020 Vendor Assessment

    Sponsored by: AT&T Cybersecurity

    Download the report today to see what the IDC MarketScape had to say in their worldwide managed security services 2020 vendor assessment.

  • Multilayered cybersecurity: part of modern cyber protection

    Sponsored by: Acronis

    In this white paper, learn how you can detect an incoming, current, new, or unknown threat the moment it arrives at your endpoint.

  • Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers

    Sponsored by: ComputerWeekly.com

    In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act

  • CW Middle East - April-June 2021: Qatari financial services regulator launches platform to help combat money laundering

    Sponsored by: ComputerWeekly.com

    The Qatar Financial Markets Authority is using a digital platform to enable financial services professionals to assess their knowledge of anti-money laundering and combating the financing of terrorism.

  • CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator

    Sponsored by: ComputerWeekly.com

    The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.

  • Royal Holloway: Testing antivirus efficacy in Linux

    Sponsored by: ComputerWeekly.com

    Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.

  • Review hybrid cloud management tools from Google, Azure, AWS, and more

    Sponsored by: Techtarget

    Plenty of organizations are already using hybrid cloud strategies, but cloud management tools and strategies can oftentimes be more complex than they need to be. Open up this E-Book to explore hybrid cloud management tools from Google, AWS, Azure, and more.

  • Explore a hybrid cloud migration strategy

    Sponsored by: Techtarget

    Check out this E-Guide on hybrid cloud adoption to learn benefits and advantages of hybrid cloud, how to migrate effectively, how to simplify your migration strategy, and much more.

  • Royal Holloway: Protecting investors from cyber threats

    Sponsored by: ComputerWeekly.com

    The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.

  • Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.

  • The Total Economic Impact™ Of ServiceNow Security Operations

    Sponsored by: ServiceNow

    With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.

  • 7 Experts on Transitioning to MDR

    Sponsored by: GoSecure

    Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.

  • How to Become a Threat Hunter

    Sponsored by: Cisco Systems Inc.

    Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.