ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • MicroScope – June 2023: Take a balanced approach to security

    Sponsored by: MicroScope

    In this issue, read about how to help customers manage their security portfolios in a world of increasingly complex systems, discover how insights are providing more opportunities for partners, and learn whether being an MSP is enjoyable or not

  • Computer Weekly – 30 May 2023: Can the UK cash in on chips?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.

  • Computer Weekly – 23 May 2023: How to secure your software supply chain

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.

  • CW APAC May 2023 – Expert advice on security and threat intelligence

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.

  • CW EMEA - May 2023: The future of work

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.

  • KuppingerCole Leadership Compass: SOAR 2023

    Sponsored by: IBM

    This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. QRadar SOAR was recognized as a leader in market segment, product/service functionality, relative market share, and innovative approaches.

  • A Guide to Improving Compliance with Network Automation Technology

    Sponsored by: Red Hat

    This white paper examines how enterprises can build a network automation initiative that improves compliance and reduces risk. It makes the case for network automation, examines the roadblocks that an organization might encounter, and offers guidance on how to implement an effective compliance strategy with network automation. Get started here.

  • MicroScope – April 2023: The benefits of security accreditations

    Sponsored by: MicroScope

    In this month's MicroScope ezine, we look at how industry-recognised certifications can strengthen business defences. We also see how ChatGPT offers the channel a chance to level the playing field. Read the issue now.

  • Centralized vs. decentralized identity management explained

    Sponsored by: TechTarget ComputerWeekly.com

    In this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.

  • Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.

  • AI in Fraud Management: Uses cases, benefits and challenges

    Sponsored by: TechTarget ComputerWeekly.com

    AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

  • MicroScope – March 2023: Steering the storage market

    Sponsored by: MicroScope

    In this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.

  • Computer Weekly – 14 February 2023: Where next for NHS IT?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.

  • Multifactor authentication: What are the pros and cons?

    Sponsored by: TechTarget ComputerWeekly.com

    One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.

  • Computer Weekly – 7 February 2023: Making IT security training stick

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our buyer's guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors. Read the issue now.

  • MicroScope – February 2023: Opportunities in security

    Sponsored by: MicroScope

    In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it

  • A Computer Weekly buyer's guide to anti-ransomware

    Sponsored by: TechTarget ComputerWeekly.com

    The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.

  • CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off

    Sponsored by: TechTarget ComputerWeekly.com

    Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.

  • 2022 Gartner Magic Quadrant for SIEM

    Sponsored by: IBM

    Gartner recognized IBM as a Leader in the 2022 Gartner Magic Quadrant for Security Information and Event Management (SIEM), marketing the 13th consecutive time IBM has been named a Leader in this report. There's a reason why IBM has been named a Leader in the Gartner Magic Quadrant for SIEM 13 times – get the details in the full report here.

  • CW Nordics - November 2022 - January 2023: Icelandic datacentres point way to greener IT

    Sponsored by: TechTarget ComputerWeekly.com

    Iceland may soon become even more attractive to firms wanting to minimise their carbon footprint while using high-performance computing services. Read more about it in this issue. Also find out how a robo investment company, Nord Investments, is harnessing open banking to make thing easier for its clients.

  • CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital

    Sponsored by: TechTarget ComputerWeekly.com

    Heineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.

  • How to get started with SASE

    Sponsored by: TechTarget ComputerWeekly.com

    Implementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.

  • CW APAC: Trend Watch: Cloud networking

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

  • CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT

    Sponsored by: TechTarget ComputerWeekly.com

    Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.

  • 7 best practices for Web3 security risk mitigation

    Sponsored by: TechTarget ComputerWeekly.com

    Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.