Search Results for: security

Trouble at your door: targeted cyber attacks in the UK and Europe
This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

TechTarget ComputerWeekly.com

SD-WAN vs. SASE: What's the difference?
SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways. In this infographic, we highlight five key differences between the SASE and SD-WAN that could help businesses choose the right technology for their needs.

TechTarget ComputerWeekly.com

Updates: The next evolution of operating systems
In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.

TechTarget ComputerWeekly.com

Computer Weekly – 30 August 2016: Get protected
It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

TechTarget ComputerWeekly.com

MicroScope – June 2023: Take a balanced approach to security
In this issue, read about how to help customers manage their security portfolios in a world of increasingly complex systems, discover how insights are providing more opportunities for partners, and learn whether being an MSP is enjoyable or not

MicroScope

12 essential features of advanced endpoint security tools
Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Internet of Things Security
In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

TechTarget ComputerWeekly.com

Ransomware: The situation at the beggining of 2022
2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.

TechTarget ComputerWeekly.com

CASB, CSPM, CWPP Emerge as Future of Cloud Security
In this eguide, learn about the emergence and the future of Cloud security tools that will help bring successful and securely protected cloud environments.

Palo Alto Networks

CW ASEAN November 2016
Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

TechTarget Security