A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
|
The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK:
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER:
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008
|
|
|
How to use a public key and private key in digital signatures
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents.
Posted: 04 Jul 2023 | Published: 04 Jul 2023
|
|
|
Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
Posted: 28 Jan 2022 | Published: 01 Feb 2022
|
|
|
In 2017, the insider threat epidemic begins
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
Posted: 08 Feb 2021 | Published: 28 Feb 2017
|
|
|
RSA Conference 2020 guide: Highlighting security's human element
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
Posted: 08 Feb 2021 | Published: 04 May 2020
|
|
|
Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023
|
|
|
MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE:
In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022
|
|
|
Migrate From Centos Linux To a Cloud-Ready Operating System
sponsored by Red Hat
WHITE PAPER:
This white paper details the benefits of migrating from CentOS Linux to Red Hat Enterprise Linux. According to IDC, compared to unpaid alternatives like CentOS Linux, Red Hat Enterprise Linux enables:32% more efficient IT infrastructure teams72% less unplanned downtime Learn more in this white paper.
Posted: 09 May 2024 | Published: 09 May 2024
|
|
|
Threat Intelligence Report 2024
sponsored by NOKIA Intel
ANALYST REPORT:
The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 23 Nov 2024 | Published: 03 Oct 2024
|
|
|
NetApp ASA Systems: Simple, powerful, affordable block-optimized storage.
sponsored by Arrow NetApp
WHITE PAPER:
NetApp ASA offers block-optimized storage systems that combine simplicity with high-end capabilities. These all-flash arrays deliver performance with latency as low as 100 microseconds, continuous data availability, and built-in ransomware protection—all at an affordable price. Learn how NetApp ASA can modernize your SAN infrastructure.
Posted: 18 Mar 2025 | Published: 18 Mar 2025
|
|
|
Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by TechTarget ComputerWeekly.com
EZINE:
This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 08 Feb 2021 | Published: 07 Dec 2018
|
|
|
Software Supply Chain Security
sponsored by Reversinglabs
EBOOK:
Understand the why, the how — and what actions your organization should take — in the new era of security. Get this guide to learn about the landscape of supply chain risks & threats, 10 tips for a successful SSCS program and how to hunt for threats in your supply chain.
Posted: 24 Jan 2025 | Published: 24 Jan 2025
|
|
|
Bending the Energy Curve: Decoupling Digitalization Trends from Data Center Energy Growth
sponsored by Schneider Electric
WHITE PAPER:
This paper explores ways to "bend the energy curve" and decouple data center energy growth from digitalization trends. It shows how modest improvements in PUE and ICT efficiency beyond current projections could reduce data center energy by 17% by 2030. Read the full white paper for industry-led strategies for sustainable data center operations.
Posted: 13 Feb 2025 | Published: 13 Feb 2025
|
|
|
E-government benchmark 2016
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 08 Feb 2021 | Published: 03 Feb 2017
|
|
|
Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK:
This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023
|
|
|
Computer Weekly - 14 July 2020: Is digital art coming of age during lockdown?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the pandemic forces many sectors into a business rethink, digital art is hoping to capitalise on changing times. Chinese supplier Lenovo is dominating the supercomputer market – we examine how it got there. And as datacentre engineers become key workers, we look at the health and safety issues. Read the issue now.
Posted: 08 Feb 2021 | Published: 14 Jul 2020
|
|
|
A Computer Weekly buyer's guide to zero-trust security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
Posted: 08 Feb 2021 | Published: 09 Mar 2020
|
|
|
Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021
|
|
|
Fintech : Meet ten financial services disruptors - Part Two
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.
Posted: 08 Feb 2021 | Published: 15 Nov 2019
|
|
|
Computer Weekly – 15 November 2022: How to protect against ransomware attacks
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.
Posted: 11 Nov 2022 | Published: 15 Nov 2022
|
|
|
CW ASEAN: Preparing for 5G
sponsored by TechTarget ComputerWeekly.com
EZINE:
As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Aug 2018
|
|
|
Getting started with Azure Red Hat OpenShift
sponsored by Red Hat
WHITE PAPER:
As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.
Posted: 13 Jun 2024 | Published: 13 Jun 2024
|
|
|
Computer Weekly - 5 May 2020: The role of AI in the war against pandemics
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 May 2020
|
|
|
Jargon buster guide to database management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.
Posted: 08 Feb 2021 | Published: 05 Jul 2018
|
|
|
Identity Security for Software Development
sponsored by CyberArk
EBOOK:
Whether you’re just starting your coding journey or a seasoned veteran, this e-book serves as a comprehensive resource for those who want to develop a deep understanding of secure coding principles and best practices. Read the O’Reilly e-book to understand today’s identity security and secure development essentials.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
|
Computer Weekly - 25 January 2022: Why watching your remote workers doesn't work
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the surge in home working led many firms to mandate use of surveillance software – we look at why it hasn't worked. It's an important year for public sector IT – we examine the trends for 2022. And with robotic process automation (RPA) booming, a Swedish bank explains the benefits. Read the issue now.
Posted: 23 Jan 2022 | Published: 25 Jan 2022
|
|
|
A Computer Weekly buyer's guide to edge computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Edge computing is currently one of the most important trends in IT. It is more likely to complement cloud by supporting workloads that are latency sensitive, require a lot of compute power, or involve large data volumes. In this 15-page buyer's guide, Computer Weekly looks at the potential of harnessing compute power at the edge.
Posted: 08 Feb 2021 | Published: 22 Jan 2020
|
|
|
CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business
sponsored by TechTarget ComputerWeekly.com
EZINE:
Computer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.
Posted: 08 Feb 2021 | Published: 07 May 2020
|
|
|
Computer Weekly - 16 February 2021: How Covid-19 has hit IT salaries and job prospects
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our salary survey reveals the impact of the coronavirus pandemic on IT professionals' wages and job security. A potentially deadly cyber attack on a US water plant highlight the risks to critical infrastructure. And we find out how NHS Scotland is using tech to support its vaccine roll-out. Read the issue now.
Posted: 15 Mar 2021 | Published: 16 Feb 2021
|
|
|
Avon calling: what happens when lockdown eliminates your business model?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2021
|
|
|
Avon calling: what happens when lockdown eliminates your business model?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Jul 2020
|
|