All Research Sponsored By:TechTarget ComputerWeekly.com

IT/OT convergence is necessary, but not so simple
EGUIDE: This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
Posted: 08 Feb 2021 | Published: 14 Aug 2020


Inside India: The world's IT powerhouse
EGUIDE: The Covid-19 pandemic is turning out to be a big fork in the road for many companies. But what about the industry that keeps the lights on for them?
Posted: 08 Feb 2021 | Published: 12 Aug 2020


Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
EZINE: In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Aug 2020


CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
EZINE: Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 08 Feb 2021 | Published: 13 Aug 2020


Computer Weekly – 4 August 2020: The UK's $500m space technology gamble
EZINE: In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Aug 2020


A Computer Weekly buyer's guide to flash storage
EGUIDE: Companies have come to count on the high performance of their flash storage services. In this 12-page buyer's guide, Computer Weekly looks at the cost of a variety of options, what the big three cloud providers have to offer and how the issue of reliability is being addressed.
Posted: 08 Feb 2021 | Published: 29 Jul 2020


Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments
EZINE: In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 28 Jul 2020


Mix and match: Overcoming cloud integration challenges
EGUIDE: This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.
Posted: 08 Feb 2021 | Published: 22 Jul 2020


The rise and rise of SD-WAN in post Covid-19
EGUIDE: So much has been up in the air in the wake of the onset of Covid-19 and the lockdowns and stay-at-home orders issued by various governments around the world. But there has been one thing that is pretty fixed: the rise and rise of software-defined wide area networks (SD-WANs).
Posted: 08 Feb 2021 | Published: 22 Jul 2020

TOPICS:  WAN

ITOps & service management: The state of play in APAC
EGUIDE: In this e-guide on ITSM in APAC, find out how to keep IT operations running to empower a remote workforce, the advantages of cloud-based service management tools and how one Australian company is managing IT incidents amid a shorter development lifecycle.
Posted: 08 Feb 2021 | Published: 22 Jul 2020


How to achieve container security best practice
EGUIDE: In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
Posted: 08 Feb 2021 | Published: 21 Jul 2020


Avon calling: what happens when lockdown eliminates your business model?
EZINE: In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Jul 2020


Royal Holloway: Purple team playbook – threat modeling for security testing
RESEARCH CONTENT: The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 08 Feb 2021 | Published: 15 Jul 2020


Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
RESEARCH CONTENT: Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Posted: 08 Feb 2021 | Published: 14 Jul 2020


10 AI and machine learning use cases in ITSM
EGUIDE: AI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 10 AI and machine learning use cases for ITSM
Posted: 08 Feb 2021 | Published: 13 Jul 2020


CIO Trends APAC: Developing a data-driven culture
EGUIDE: In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.
Posted: 08 Feb 2021 | Published: 13 Jul 2020


Computer Weekly - 14 July 2020: Is digital art coming of age during lockdown?
EZINE: In this week's Computer Weekly, as the pandemic forces many sectors into a business rethink, digital art is hoping to capitalise on changing times. Chinese supplier Lenovo is dominating the supercomputer market – we examine how it got there. And as datacentre engineers become key workers, we look at the health and safety issues. Read the issue now.
Posted: 08 Feb 2021 | Published: 14 Jul 2020


Why you need convergence
EGUIDE: You need convergence today more ever.  Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive.
Posted: 08 Feb 2021 | Published: 10 Jul 2020


CW ANZ, July 2020: Expert Advice on Security
EZINE: In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Posted: 08 Feb 2021 | Published: 09 Jul 2020


CW APAC, July 2020: Trend Watch: Security
EZINE: In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
Posted: 08 Feb 2021 | Published: 09 Jul 2020


Royal Holloway: Driverless vehicle security for military applications
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 08 Feb 2021 | Published: 14 Jul 2020


Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020


Royal Holloway: Man proposes, fraud disposes
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 08 Feb 2021 | Published: 14 Jul 2020


Making the case for cloud-based security
EGUIDE: Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 08 Feb 2021 | Published: 07 Jul 2020


Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
RESEARCH CONTENT: Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
Posted: 08 Feb 2021 | Published: 08 Jul 2020