Search Results for: security

Top 10 ASEAN IT stories of 2021
From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.

TechTarget ComputerWeekly.com

Powerful DDoS Attacks & Recovery for Enterprises
A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.

Arbor Networks

The next wave of IoT in Asia: What to expect in 2018
In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.

TechTarget ComputerWeekly.com

Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises
In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.

TechTarget ComputerWeekly.com

CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT
The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.

TechTarget ComputerWeekly.com

Casting IT into the Shadows
Shadow IT poses significant risks to organizations, including data breaches, compliance issues, and operational challenges. Download this e-book now to learn how you can proactively manage SaaS and eliminate the threat of shadow IT.

JumpCloud

The CISO's guide to supply chain security
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

TechTarget ComputerWeekly.com

Essential Guide: APAC women in cyber security
In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.

TechTarget ComputerWeekly.com

CW Middle East - April-June 2021: Qatari financial services regulator launches platform to help combat money laundering
The Qatar Financial Markets Authority is using a digital platform to enable financial services professionals to assess their knowledge of anti-money laundering and combating the financing of terrorism.

TechTarget ComputerWeekly.com

12 API security best practices
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

TechTarget ComputerWeekly.com