ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security White Papers

  • Simplifying Cluster Security at Scale

    Sponsored by: CyberArk

    CyberArk and Red Hat have an approach that centralizes and automates secrets management. This paper explains how solution architects can use these integrated technologies to help organizations strengthen security in Kubernetes clusters across production and development environments in multiple clouds, public and private.

  • MicroScope – March-April 2024: Is cloud the best option?

    Sponsored by: MicroScope

    In this issue, find out why cloud may not always be the right course of action for businesses to take. Also discover the growing threat artificial intelligence brings to the cyber security market, as well as read predictions on what areas will grow over the course of the year

  • A cloud-first strategy keeps TIP in the driver’s seat

    Sponsored by: NTT

    Agility is essential—both for on-the-road suppliers and data center infrastructure—an imperative that TIP Trailer Services (TIP), a leading logistics equipment service provider, well recognizes. To learn from TIP’s cloud migration successes to achieve this agility with the help of NTT, read their case study.

  • CW APAC – Trend Watch: CIO trends

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations have plenty of technologies to keep track of when digitising their operations. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at IT predictions for 2024, how India's space missions will propel tech and Australia's advances in cyber security.

  • The Buyer's Guide to Complete Cloud Security

    Sponsored by: CrowdStrike

    Conventional approaches to security can’t deliver the granular visibility and control needed to manage cloud risk, particularly risk associated with containers. This buyer’s guide captures the definitive criteria for choosing the right cloud-native application protection platform (CNAPP) and partner.

  • MicroScope January-February 2024: Things are looking up for 2024

    Sponsored by: MicroScope

    In this issue, catch up on what experts predict for the year ahead in the channel business, as well as a look back on 2023. Also, read about upcoming areas for growth and the importance of understanding cloud reselling to demystify customer needs

  • Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.

  • The Rise of Single Vendor SASE

    Sponsored by: Palo Alto Networks

    While many organizations have started their SASE journey with pilot projects and limited deployments, what has been learned is that on your way to improved collaboration and security, there is no one clear path. One thing that is known is that SASE offers cost reductions, better security, and easy deployment. Read this Omdia report to learn more.

  • Computer Weekly – 3 October 2023: Where next for quantum computing?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the head of Amazon's Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now.

  • Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.

  • 8 key characteristics of cloud computing

    Sponsored by: TechTarget ComputerWeekly.com

    When it comes to building and deploying modern applications, companies rely on the cloud. From the ability to manage automation, costs, performance, compliance, and security, cloud provides flexibility that sets it apart from on-premises IT architectures. In this e-guide, explore the 8 key characteristics of cloud computing.

  • Best cloud security certifications

    Sponsored by: TechTarget ComputerWeekly.com

    Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove their knowledge to potential employers. Are you trying to figure out which certifications will most advance your knowledge and career? Download this infographic to get the lowdown on the best cloud security certifications.

  • Ultimate guide to digital transformation for enterprise leaders

    Sponsored by: TechTarget ComputerWeekly.com

    This in-depth guide explains what digital transformation is, why it is important and how enterprises can successfully transition to this new business paradigm.

  • Inside MLC Life Insurance's cloud journey

    Sponsored by: TechTarget ComputerWeekly.com

    When MLC decided to move all its infrastructure, applications and services to the public cloud, its journey was more about people than technology. Learn how MLC overcame these people-related challenges in its move to cloud, improved its security posture and reduced infrastructure spending.

  • CW APAC: Buyer's guide to SASE

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

  • Comparing Azure Active Directory options

    Sponsored by: TechTarget ComputerWeekly.com

    Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

  • Top 11 cloud security challenges and how to combat them

    Sponsored by: TechTarget ComputerWeekly.com

    Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.

  • The ultimate guide to identity & access management

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.

  • Top 10 India IT stories of 2022

    Sponsored by: TechTarget ComputerWeekly.com

    In this roundup, we recap the top 10 stories in India, including the digitisation work undertaken by global firms in the country, progress made by local enterprises in harnessing technology and how a female coder rose through the ranks in her software development career.

  • Top IT Predictions in APAC in 2023

    Sponsored by: TechTarget ComputerWeekly.com

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

  • Best practices for container security in the data center

    Sponsored by: TechTarget ComputerWeekly.com

    Containers present unique security challenges and data centers must learn and adapt to those challenges. Although containers might present certain unfamiliar security risks, data center admins who work with them can learn several effective ways to keep their container environments safe.

  • CW APAC: Trend Watch: Cloud networking

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

  • 5 endpoint security best practices

    Sponsored by: TechTarget ComputerWeekly.com

    With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.

  • MicroScope – June 2022: A return to face-to-face meetings

    Sponsored by: MicroScope

    With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel

  • Royal Holloway: Cloud-native honeypot deployment

    Sponsored by: TechTarget ComputerWeekly.com

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.