CERT Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

EclecticIQ Empowers a National CERT’s Collaborative Threat Intelligence Sharing Community
sponsored by EclecticIQ
CASE STUDY: A national CERT implemented an EclecticIQ hub-and-spoke threat intelligence platform to enhance collaboration, improve cyber situational awareness, and increase resilience. By sharing high-quality threat data, the CERT and member agencies reduced false positives and enabled faster threat response. Read the full case study to learn more.
Posted: 19 Feb 2025 | Published: 20 Feb 2025

EclecticIQ

Endpoint Security Evaluation Guide
sponsored by Malwarebytes
WHITE PAPER: This e-book provides a comprehensive guide to evaluating endpoint security solutions. It covers 11 critical criteria for effective protection, including preventing zero-day threats, blocking phishing and ransomware, and ensuring low performance impact. Read the full guide to learn how to select the right endpoint security for your organization.
Posted: 23 Jan 2025 | Published: 23 Jan 2025

Malwarebytes

VXWorks for Aerospace and Defense
sponsored by Wind River
PRODUCT OVERVIEW: VxWorks® aerospace and defense software saves costs and accelerates certification. Proven in 750+ safety programs and 120+ aircraft, Read how VxWorks streamlines compliance, satisfies real-time operating systems needs, secures systems, simplifies software integration, and inspires developers.
Posted: 02 Dec 2023 | Published: 02 Dec 2023

TOPICS:  .NET
Wind River

Buyer’s Guide for Machine Identity Management
sponsored by Venafi & Intel
RESOURCE: This buyer’s guide provides you with a checklist to help evaluate which solutions provide the most agile management across all your certificate authorities. You’ll learn which capabilities provide the flexibility you need to protect keys and certificates across your organization. Download this buyer’s guide to learn more.
Posted: 07 Dec 2021 | Published: 08 Dec 2021

TOPICS:  .NET
Venafi & Intel

Supersize The Value Of Your Microsoft Security Investments
sponsored by Orange Cyberdefense
PRODUCT OVERVIEW: How can you amplify your Microsoft investments? By leveraging an objective and experienced view of the solutions in your security ecosystem, you can gain a clearer understanding of how to use them effectively and build a more comprehensive cybersecurity strategy. Read on to learn how managed services can help you get there.
Posted: 16 Jan 2024 | Published: 17 Jan 2024

TOPICS:  .NET
Orange Cyberdefense

CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 08 Feb 2021 | Published: 19 Mar 2020

TechTarget ComputerWeekly.com

Cybercrime: A Multifaceted National Security Threat
sponsored by Google
WHITE PAPER: This white paper explores cybercrime as a national security threat, examining its impacts, support of state-sponsored activities, and effects on critical infrastructure. It analyzes the evolving cybercrime ecosystem and offers recommendations for a comprehensive approach. Read the full paper to grasp the complexity of this issue.
Posted: 08 Mar 2025 | Published: 08 Mar 2025

Google

What is Incident Response? Plans, Teams and Tools
sponsored by AT&T Corp
EGUIDE: Many experts use the terms incident response and incident management interchangeably, but the two are hardly the same. So, what is incident response? And what are the essential elements you need to know for protecting your organization? Read this e-guide to find out.
Posted: 18 Sep 2023 | Published: 29 Feb 2024

TOPICS:  Cybersecurity
AT&T Corp

Run Complex Queries on Massive Amounts of Data Stored on Your Amazon Documentdb Clusters Using Apache Spark Running on Amazon EMR
sponsored by Amazon Web Services
WHITE PAPER: This blog post shows how to use Apache Spark on Amazon EMR to run complex queries on large datasets in Amazon DocumentDB clusters. It covers setting up components, configuring security, and executing queries. Learn to leverage distributed processing for efficient analysis of your document database data. Read the blog for step-by-step instructions.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Amazon Web Services

Wind River Certifiable Intellectual Property (IP) Blocks
sponsored by Wind River
PRODUCT OVERVIEW: Wind River's DO-178C-compliant IP streamlines avionics certification. Their pre-verified virtualization, networking, security & storage solutions slash development time, costs & risks.
Posted: 02 Dec 2023 | Published: 02 Dec 2023

TOPICS:  .NET
Wind River

CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital
sponsored by TechTarget ComputerWeekly.com
EZINE: Heineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.
Posted: 26 Oct 2022 | Published: 10 Nov 2022

TechTarget ComputerWeekly.com

Top 10 cyber crime stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

The Essential Guide to the 2023 MITRE Engenuity ATT&CK Evaluations
sponsored by Palo Alto Networks
RESEARCH CONTENT: Discover how Palo Alto Networks' Cortex XDR performed in MITRE's 2023 cyberattack simulations versus Turla. Achieving 100% visibility, it blocked all techniques, ensuring top-quality detections. Delve into the results and uncover Cortex XDR's effectiveness in this report.
Posted: 27 Dec 2023 | Published: 27 Dec 2023

TOPICS:  .NET
Palo Alto Networks

Focus: how to avoid being hit by ransomware
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
Posted: 08 Feb 2021 | Published: 18 May 2017

TechTarget ComputerWeekly.com

Navigating The Complex World Of NIS2 With Microsoft Security Solutions
sponsored by Orange Cyberdefense
WHITE PAPER: The European NIS2 directive aims to harmonize cybersecurity requirements across the EU. Learn how Microsoft Security solutions can help your organization meet NIS2 compliance, from risk management to incident response. Read the white paper to prepare for the new regulations.
Posted: 25 Feb 2025 | Published: 25 Feb 2025

Orange Cyberdefense

Accelerating Avionics Safety Certification
sponsored by Wind River
CASE STUDY: Aerospace manufacturers struggle with costly, time-consuming DO-178C avionics software certification. Wind River's certifiable IP blocks reuse pre-certified components, slashing certification time and cost. This case study examines how a customer leveraged Wind River's software to quickly certify a 16-core system, saving millions.
Posted: 02 Dec 2023 | Published: 02 Dec 2023

TOPICS:  .NET
Wind River

Become an Intelligent Enterprise with Red Hat, Google Cloud, and SAP
sponsored by Red Hat
WHITE PAPER: Despite the number of organizations that rely on their SAP environments to support their business applications and data, many have not yet migrated their databases to SAP HANA. However, accelerating this migration can be daunting, especially when businesses are unsure of their next steps. Browse this white paper to learn more.
Posted: 15 Feb 2023 | Published: 15 Feb 2023

TOPICS:  .NET
Red Hat

CW Middle East - October-December 2022: Qatar strengthens cyber defences ahead of FIFA World Cup
sponsored by TechTarget ComputerWeekly.com
EZINE: Being the first Arab country to host the World Cup is pressure enough on Qatar, but there is also a massive cyber security challenge associated with any event of this magnitude. Read about its preparations. Also in this issue, find out about the unique challenges of hiring IT professionals in Saudi Arabia.
Posted: 03 Oct 2022 | Published: 13 Oct 2022

TechTarget ComputerWeekly.com

Essential Guide to Software Defined Networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Software defined networking (SDN) allows network engineers to support a switching fabric across multi-vendor hardware and application-specific integrated circuits. A network administrator can shape traffic from a centralised control console without having to touch individual switches.
Posted: 08 Feb 2021 | Published: 12 Feb 2018

TechTarget ComputerWeekly.com

CW EMEA - May 2023: The future of work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
Posted: 10 May 2023 | Published: 11 May 2023

TechTarget ComputerWeekly.com

Navigating the Compliance Labyrinth: Transform NIS2 & DORA Regulations into Strategic Advantages with SASE
sponsored by Open Systems
WHITE PAPER: This white paper explores transforming NIS2 and DORA regulations into strategic advantages with a managed SASE solution. It guides on benchmarking cybersecurity maturity, implementing robust security controls, and navigating the evolving regulatory landscape. Read the full white paper to strengthen your organization's digital resilience.
Posted: 19 Feb 2025 | Published: 19 Feb 2025

All resources sponsored by Open Systems

Legacy PKI Migration
sponsored by CyberArk
WHITE PAPER: Public Key Infrastructures (PKIs) are a foundational and critical element of every organization's cybersecurity. But legacy PKIs are too antiquated for today's lightning-fast, hyperconnected business world. Read this white paper to explore why the answer to your broken legacy PKI may be a PKI-as-a-service solution.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

CyberArk

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

CW Benelux ezine August 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.
Posted: 08 Feb 2021 | Published: 15 Aug 2016

TechTarget ComputerWeekly.com

CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com