Search Results for: security

Focus: Enterprise Mobility Management
In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

TechTarget ComputerWeekly.com

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.

TechTarget ComputerWeekly.com

Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.

TechTarget ComputerWeekly.com

Infographic: 7 steps to secure your home wi-fi network
Wi-Fi security, in particular, has evolved. While the days of war driving and finding home networks open to exploit may be over, home Wi-Fi security could still go sideways in many places. Here are seven recommendations to make sure your home Wi-Fi network is secure.

TechTarget ComputerWeekly.com

Computer Weekly – 22 January 2019: Moving beyond network boundaries
In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

TechTarget ComputerWeekly.com

Computer Weekly – 15 October 2019: Securing the internet of things
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

TechTarget ComputerWeekly.com

Remote Connectivity Platforms Enable Secure and Resilient Business Operations
Download this IDC report for your roadmap on establishing secure remote connectivity for both agile and productive business operations. Inside the data-rich report, learn how to obtain a 360-degree security posture, to get the most from your connectivity platform, and to view essential guidance to get you started.

TeamViewer

Quocirca: Selecting a cloud printing platform
As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to training programmes and tools
It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.

TechTarget ComputerWeekly.com

Why Traditional App Sec Testing Fails on Supply Chain Security
Learn why traditional application security testing tools alone leave your organization exposed to supply chain attacks — and how software supply chain security tools represent an evolution of traditional application security tools, ensuring end-to-end software security.

TOPICS: .NET
ReversingLabs