Security White Papers
-
MicroScope – June 2023: Take a balanced approach to security
Sponsored by: MicroScopeIn this issue, read about how to help customers manage their security portfolios in a world of increasingly complex systems, discover how insights are providing more opportunities for partners, and learn whether being an MSP is enjoyable or not
-
Computer Weekly – 30 May 2023: Can the UK cash in on chips?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
-
Computer Weekly – 23 May 2023: How to secure your software supply chain
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
-
CW APAC May 2023 – Expert advice on security and threat intelligence
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
-
CW EMEA - May 2023: The future of work
Sponsored by: TechTarget ComputerWeekly.comIn this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
-
KuppingerCole Leadership Compass: SOAR 2023
Sponsored by: IBMThis report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. QRadar SOAR was recognized as a leader in market segment, product/service functionality, relative market share, and innovative approaches.
-
A Guide to Improving Compliance with Network Automation Technology
Sponsored by: Red HatThis white paper examines how enterprises can build a network automation initiative that improves compliance and reduces risk. It makes the case for network automation, examines the roadblocks that an organization might encounter, and offers guidance on how to implement an effective compliance strategy with network automation. Get started here.
-
MicroScope – April 2023: The benefits of security accreditations
Sponsored by: MicroScopeIn this month's MicroScope ezine, we look at how industry-recognised certifications can strengthen business defences. We also see how ChatGPT offers the channel a chance to level the playing field. Read the issue now.
-
Centralized vs. decentralized identity management explained
Sponsored by: TechTarget ComputerWeekly.comIn this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.
-
Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.
-
AI in Fraud Management: Uses cases, benefits and challenges
Sponsored by: TechTarget ComputerWeekly.comAI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
-
MicroScope – March 2023: Steering the storage market
Sponsored by: MicroScopeIn this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.
-
Computer Weekly – 14 February 2023: Where next for NHS IT?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.
-
Multifactor authentication: What are the pros and cons?
Sponsored by: TechTarget ComputerWeekly.comOne of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
-
Computer Weekly – 7 February 2023: Making IT security training stick
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our buyer's guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors. Read the issue now.
-
MicroScope – February 2023: Opportunities in security
Sponsored by: MicroScopeIn this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
-
A Computer Weekly buyer's guide to anti-ransomware
Sponsored by: TechTarget ComputerWeekly.comThe threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
-
CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off
Sponsored by: TechTarget ComputerWeekly.comFinland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.
-
2022 Gartner Magic Quadrant for SIEM
Sponsored by: IBMGartner recognized IBM as a Leader in the 2022 Gartner Magic Quadrant for Security Information and Event Management (SIEM), marketing the 13th consecutive time IBM has been named a Leader in this report. There's a reason why IBM has been named a Leader in the Gartner Magic Quadrant for SIEM 13 times – get the details in the full report here.
-
CW Nordics - November 2022 - January 2023: Icelandic datacentres point way to greener IT
Sponsored by: TechTarget ComputerWeekly.comIceland may soon become even more attractive to firms wanting to minimise their carbon footprint while using high-performance computing services. Read more about it in this issue. Also find out how a robo investment company, Nord Investments, is harnessing open banking to make thing easier for its clients.
-
CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital
Sponsored by: TechTarget ComputerWeekly.comHeineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.
-
How to get started with SASE
Sponsored by: TechTarget ComputerWeekly.comImplementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.
-
CW APAC: Trend Watch: Cloud networking
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
-
CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT
Sponsored by: TechTarget ComputerWeekly.comFaced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.
-
7 best practices for Web3 security risk mitigation
Sponsored by: TechTarget ComputerWeekly.comWeb3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.