You've requested...

API Security Fills Critical Gap in Cyber Protection

If a new window did not open, click here to view this asset.

Download this next:

Threat Intelligence Report 2024

With it being reported that DDoS traffic is growing at a rate higher than any other type of network traffic, increasing 166% between June 2023 and June 2024, it has become critical for organizations to step up their security measure and ensure that they keep up with the current trends.

The Threat Intelligence Report 2024 from Nokia highlights cybersecurity trends and threats in the telecom industry. It details cyberattacks like ransomware, data theft, and service disruptions across regions, as well as how technologies like generative AI and quantum computing enable advanced attacks and offer new defenses.

Dig into the full report to discover more of today's top trends and learn how the steps you can take to counter these attacks and better protect your business.

These are also closely related to: "API Security Fills Critical Gap in Cyber Protection"

  • Top 10 ANZ IT stories of 2022

    Years of underinvestment in cyber security in Australia has made the country a lucrative target for cyber criminals who created havoc for two well-known companies this year.

    Both Optus and Medibank suffered major data breaches within a span of months, casting the spotlight on the cyber resilience of Australian companies. The spate of attacks has led to calls for a new cyber strategy that aims to turn Australia into a global cyber leader, among other goals.

    Still, the growing cyber threats have not deterred Australian companies from pressing on with their digital transformation efforts. Banks and financial institutions are doubling down on cloud while others are tapping emerging technologies like blockchain and event streaming to solve real-world problems.

    In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.

  • Unburden yourself from AI/ML modeling issues with Red Hat OpenShift AI

    AI adoption is no longer a hypothetical investment. Gartner now estimates that 85% of enterprises will have used gen AI application programming interfaces (APIs) or deployed GenAI-enabled applications by 2026.

    Deploying these technologies, however, can be complicated. As data scientists strive to build their models, they often encounter a lack of alignment between rapidly evolving tools.

    Discover in this product overview how Red Hat OpenShift AI can help your team develop, train, test, and deploy ML across the hybrid cloud without being dragged down by limited architectural choices.

Find more content like what you just read:

  • How APAC is riding the cloud wave

    In this e-guide, find out why artificial intelligence is set to be the cloud's killer app, how Aussie firms are managing data in the cloud, and the Singapore government's move to develop its own cloud technology stack.

    Download

  • Explore Key Considerations for Threat Prevention Solution Selection

    This Threat Prevention Buyer's Guide explores the evolving security landscape, emphasizing the need for cloud-native sandboxing that can detect and prevent unknown threats inline without disrupting user productivity. Learn how to choose the right cloud sandbox solution. Read the full buyer's guide.

    Download

  • Computer Weekly – 15 January 2019: NHS plans for a digital future

    In this week's Computer Weekly, we look at the NHS Long-Term Plan and examine how it intends to transform UK healthcare for a digital age. We analyse the latest chip developments from Intel and AMD to see what will change in the datacentre in 2019. And we ask the experts if Amazon Web Services can continue its growth trajectory. Read the issue now.

    Download

  • Computer Weekly – 19 January 2021: The UK's struggle with digital schooling

    In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.

    Download

  • Developing the Intelligent Core with Windows Server 2019

    65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. Learn more about digital platforms inside this resource.

    Download

  • Security brief: Threats against people, apps, and infrastructure

    Take a deep look at the most important trends shaping the cyber threat landscape today: AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust. Based on the extensive data from Cloudflare’s cloud network, this security brief highlights key trends. Access the brief to learn more.

    Download

  • Computer Weekly – 1 August 2017: The fields of Athenry – how Apple's datacentre plans are causing turmoil in a small Irish town

    In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.

    Download

  • API security solution evaluation guide

    Today, the efficiencies gained from APIs are overshadowed by the risk introduced to an IT enterprise. This e-book takes a realistic look at what buyers of API security solutions should look for when performing a product evaluation, helping you find the API security solution that’s right for your organization’s needs. Download now to learn more.

    Download

  • CW APAC, Sep 2021: Buyer's guide to robotic process automation

    In this handbook, Computer Weekly looks at the adoption of robotic process automation in APAC and where the technology fits in the wider automation landscape

    Download

  • What to look for in an email security provider

    Email is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.

    Download

  • Trend Watch: CIO trends

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at predictions for 2023, how the Australian Red Cross managed a donation surge, Mondelez's digital transformation and Singapore's public sector IT strategy.

    Download

  • Solution Guide: Tap into limitless potential with Lenovo AI PCs

    As your employees increasingly use AI tools to take their productivity and creativity to the next level, give them an experience that can meet the demands of their emerging AI workloads. Download this solution guide to find out how you can further maximize your AI PC investments with end-to-end services from Lenovo.

    Download

  • 9 ways to scale AI with data integration and "Super iPaaS"

    As enterprises scale AI, data integration is critical to overcoming challenges like data silos, quality, and security. This white paper explores how modern data integration solutions can provide the foundation for successful, scalable AI initiatives. Learn more by reading the full white paper.

    Download

  • Supporting DORA Objectives with Akamai

    The EU's Digital Operational Resilience Act (DORA) sets new standards for financial services to enhance their resilience against cyberthreats. Akamai’s latest white paper provides key insights into how financial institutions can prepare for and meet DORA’s stringent requirements.

    Download

  • Unified Risk Posture: A CISO's Guide To Reducing Risk And Complexity

    As cybersecurity risks expand, CISOs need a unified approach to evaluate, exchange, and enforce risk posture across users, apps, and data. Learn how to simplify risk management and optimize security investments in this e-book.

    Download

  • Computer Weekly - 8 December 2020: Where next for Windows?

    In this week's Computer Weekly, Windows is still the most-used operating system in enterprises – we look at where Microsoft aims to take it next. We examine some of the key questions for CIOs for their 2021 IT strategy. And we analyse the best practice in preventing distributed denial of service (DDoS) attacks. Read the issue now.

    Download

  • Inbox incursions are more than an annoyance they are a security risk

    An inbox incursion occurs when phishing emails are available to the end user for any length of time, forcing the vendor to remediate them post-delivery. Download this white paper for a deeper look at inbox incursion and the role it plays in the broader topic of email security.

    Download

  • CW APAC: CIO trends

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead

    Download

  • CW Europe - June-August 2021: Amsterdam reins back datacentre developments over environmental concerns

    The construction of datacentres in the Netherlands' Amsterdam region has accelerated at such a pace that their demands for electricity are causing concern, prompting city authorities and datacentre operator to open a dialogue about sustainable datacentre industry expansion.

    Download

  • Discover the new application security risks in 2021 OWASP Top 10

    The OWASP Top 10 outlines the most serious risks to web applications, with broken access control now the top threat. Learn how to mitigate these risks and protect your applications with F5 Distributed Cloud Web App and API Protection. Read the full e-book for comprehensive insights.

    Download

  • CW APAC April 2023 – Trend Watch: Business applications

    Tech's role in the workplace continues to grow. In this handbook, focused on business applications in the Asia-Pacific region, Computer Weekly looks at industry cloud platforms, how microservices improve customer experience, what automation brings to banking and Rimini Street's approach to third-party support

    Download

  • Computer Weekly – 16 August 2016: Barriers to UK datacentre expansion

    A TechUK survey has found that the UK tech sector's confidence of growth over the next two years has dropped by 23 points, due to Brexit. In this week's issue, we look at how Asian investors are pulling out of datacentre investments. According to datacentre analyst Broadgroup, these investors have been quite spooked by the Brexit vote.

    Download

  • Top IT Predictions in APAC in 2023

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

    Download

  • Computer Weekly – 30 April 2024: What's it like being the IT chief at Man Utd?

    In this week's Computer Weekly, we speak to the chief digital information officer of Manchester United Football Club to discuss the IT that keeps a premiership team running. We also investigate how well prepared the UK is for major semiconductor supply chain disruptions. Read the issue now.

    Download

  • The Essential WAF Buyer’s Guide

    Choosing the wrong WAF can lead to high false positives, brittle AppSec configurations and high maintenance costs. That’s why having the right evaluation criteria is essential. This buyer's guide aims to bridge the information gap so you can make a confident decision.

    Download

  • Computer Weekly – 30 August 2016: Get protected

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

    Download

  • Expert guide: Best enterprise content management software of 2022

    Enterprise content management (ECM) software can be an expensive, heavily involved purchase, so it's important to understand options before arriving at a decision. In this expert guide, we listed 10 important ECM platforms to consider while making a buying decision.

    Download

  • AI-powered Identity: Fact or Fantasy?

    AI-powered identity can enhance security, streamline governance, and improve user experience. Learn how AI bridges traditionally opposed business benefits of identity management. Read the full white paper to discover the value of AI-powered identity.

    Download

  • Optimize performance, cost, and control across your hybrid cloud

    While organizations need hybrid and multi-cloud deployments, many are still plagued by the question: How do you optimally allocate workloads between clouds and on-premises locations in order to optimize performance? Download this white paper to see how HP answers this question.

    Download

  • UK IT Priorities 2019

    The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.

    Download

  • UK IT Priorities 2019

    The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.

    Download

  • Einheitlicher Risikostatus

    Dieser CISO-Leitfaden beschreibt einen einfacheren Ansatz, der die wichtigsten Phasen des Managements der Risikoposition auf einer einzigen Plattform vereint. Dieser einheitliche Ansatz ermöglicht es Ihnen, Risiken dynamisch zu bewerten, Risikosignale auszutauschen und Kontrollen in sich entwickelnden IT-Umgebungen durchzusetzen.

    Download

  • Countdown to GDPR

    In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.

    Download

  • Financial Services Regulatory Compliance

    Akamai’s new e-book, Financial Services Regulatory Compliance: 5 Key Business Objectives, explores the critical strategies for financial institutions to navigate complex regulatory landscapes. Discover actionable insights to meet evolving regulations and safeguard your business against financial and reputational risks.

    Download

  • The application transformation non-negotiables: Linux, K8s, & more

    Application transformation can help you modernize existing apps and build new cloud-native ones faster. Learn how Red Hat OpenShift provides an integrated platform, tools, and services to accelerate your journey in this e-book.

    Download

  • Data Integration Reference Architectures for Business Acceleration with Qlik

    In this e-book, you'll discover how Qlik Data Integration enables real-time insights, data speed and scale, and flexibility to accelerate your business. You'll also learn about 6 reference architectures for data warehouses, data lakes, data lakehouses, event-driven data, and data mesh. Read on now to explore the advantages.

    Download

  • Data Integration Reference Architectures for Business Acceleration with Qlik

    In this e-book, you'll discover how Qlik Data Integration enables real-time insights, data speed and scale, and flexibility to accelerate your business. You'll also learn about 6 reference architectures for data warehouses, data lakes, data lakehouses, event-driven data, and data mesh. Read on now to explore the advantages.

    Download

  • Leveraging XDR and Gen AI to strengthen 5G network security

    This ABI Research report explains how XDR can enhance 5G security; how Generative AI can significantly improve XDR's ability to detect, analyze, and respond to threats in the 5G ecosystem; and how to strengthen 5G security with Nokia's NetGuard Cybersecurity Dome.Learn how GenAI can strengthen your 5G security by reading the full report here.

    Download

  • Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief

    In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.

    Download

  • Computer Weekly – 16 May 2023: Microsoft and Google go into battle for enterprise AI

    In this week's Computer Weekly, as developments in generative AI accelerate, Microsoft and Google have each unveiled plans around enterprise applications. Nobody doubts the importance of digital transformation – but experts say it won't work without cultural change as well. Read the issue now.

    Download

  • Computer Weekly – 27 February 2018: How IT is taking UPS to new heights

    In this week's Computer Weekly, we talk to UPS CIO Juan Perez to find out how making his IT department "business intimate" is driving innovation. We look at how cloud management platforms can help ease the adoption of multiple public cloud services. And we examine how UK local councils are struggling to deal with cyber attacks. Read the issue now.

    Download

  • CW APAC - June 2021: Career guide to cloud computing

    In this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy

    Download

  • Omdia universe: Email security, 2024

    Email is notoriously susceptible to attacks, making email security a continuing necessity for organizations. In order to make sense of a crowded and complex market, this Omnia Universe report breaks down the most important information about the landscape as a whole, as well as leading vendors. Read on to learn more.

    Download

  • A Force Multiplier for Your SOC: The Cortex Platform

    Your business, like all businesses, may need some help facing an attack surface overflowing with threats. Palo Alto Network’s Cortex Platform is here to offer that support. Dig into this infographic to understand how the platform’s use of automation can take some pressure off of your security team and augment your defense strategy.

    Download

  • Application transformation: Current trends, key considerations & more

    Azure Red Hat OpenShift provides a unified, cloud-based application platform to modernize apps, build cloud-native services, and accelerate innovation. Unlock new business possibilities with expert-managed hybrid cloud services. Read the full white paper to learn more.

    Download

  • Computer Weekly – 13 April 2021: The evolution of RPA

    In this week's Computer Weekly, our latest buyer's guide looks at the future of robotic process automation (RPA). Google's legal victory against Oracle over the use of Java APIs has huge significance for software developers. And we find out how expectations of IT have grown as firms prepare for the post-Covid workplace. Read the issue now.

    Download

  • Cloud Email Security (CES)

    Findings show that 91% of all cyber-attacks begin with a phishing email. Cloudflare's Area 1 cloud-native email security solution was designed to leverage preemptive campaign intelligence, ML-based content analysis, and a unified Zero Trust platform to stop phishing threats before they reach your workforce. Read on to learn more.

    Download