Search Results for: security

9 essential elements of network security
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

TechTarget ComputerWeekly.com

CW Middle East - July-September 2022: UAE citizens embrace new digital technologies
A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.

TechTarget ComputerWeekly.com

6 Ways to Keep Your Endpoint Devices Secure
Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.

Sentinel Labs, Inc.

CW APAC, April 2022: Trend Watch: Cyber security
In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

TechTarget ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

TechTarget ComputerWeekly.com

False cents of security: The price of being compromised
Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.

TechTarget ComputerWeekly.com

Infographic: Vulnerability management vs. Patch management
Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both. Here's a deep dive into their differences, the important places they overlap and software options for automating them.

TechTarget ComputerWeekly.com

The Investigatory Powers Act 2016 and Internet Connections Records
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to anti-ransomware
The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.

TechTarget ComputerWeekly.com

September ezine: Thinking digital in the world of storage
The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry

MicroScope