Hunting Industry Reports

CW EMEA – February 2023: Kyiv is ready for anything
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW EMEA, the CIO at Kyiv City Council explains how its IT team has kept services running for residents amid relentless bombing by Russia. We also look at the Netherlands’ plans to regulate AI to reduce bias, how highly accurate time protocols ensure fair trading, and the use of tech in agriculture in Denmark. Read the issue now.
Posted: 02 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Beginner's guide to Internet of Things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Threat hunting frameworks, techniques and methodologies
sponsored by EclecticIQ
EGUIDE: To improve their security operations and investigation, some organizations have started to implement threat hunting frameworks into their existing intelligence systems and strategies. However, while threat hunting is on the rise, it’s still a relatively new concept. Access this e-guide to discover more.
Posted: 29 Jan 2025 | Published: 29 Jan 2025

EclecticIQ

Threat Hunters - Episode 3
sponsored by Logicalis
VIDEO: Threat hunting requires teamwork and confidential intelligence to stay ahead of threat actors. Effective threat hunting involves collaboration across organizations and stakeholders, with a human touch to coordinate response. Watch this brief video to learn more about the critical role of threat hunting in protecting customer data.
Posted: 21 Feb 2025 | Premiered: 22 Feb 2025

TOPICS:  .NET
Logicalis

Threat intelligence vs. threat hunting: Better together
sponsored by EclecticIQ
EGUIDE: Today, organizations need all the help they can get when it comes to mitigating cyber threats. To do so, some have turned to strategies such as threat intelligence and threat hunting, which can help security teams improve their efforts. Access this guide to learn more.
Posted: 30 Jan 2025 | Published: 30 Jan 2025

EclecticIQ

What generative AI's rise means for the cybersecurity industry
sponsored by TechTarget ComputerWeekly.com
EGUIDE: ChatGPT's cultural and economic ascent in recent months has led to an interest in generative AI as a whole, and that moment has included cybersecurity. However, experts differ on whether the moment is more steeped in marketing or emerging technology.
Posted: 19 Jun 2023 | Published: 19 Jun 2023

TechTarget ComputerWeekly.com

The technological evolution of IT industry leaders: Part two
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.
Posted: 08 Feb 2021 | Published: 26 Feb 2020

TechTarget ComputerWeekly.com

Lightbeam Health Solutions
sponsored by Lightbeam Health Solutions
WHITE PAPER: Lightbeam Health Solutions reports ACOs using their tech saved $492 million in Medicare Shared Savings in 2023, surpassing $3 billion since 2014. Their Advisory Services and solutions, like Deviceless Remote Patient Monitoring, enhance cost savings and patient outcomes. Read the white paper for insights on Lightbeam's value-based care impact.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

Lightbeam Health Solutions

A Computer Weekly buyer's guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 08 Feb 2021 | Published: 16 Oct 2019

TechTarget ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

TechTarget ComputerWeekly.com

Software Supply Chain Security
sponsored by Reversinglabs
EBOOK: Understand the why, the how — and what actions your organization should take — in the new era of security. Get this guide to learn about the landscape of supply chain risks & threats, 10 tips for a successful SSCS program and how to hunt for threats in your supply chain.
Posted: 24 Jan 2025 | Published: 24 Jan 2025

Reversinglabs

The Defender’s Advantage Artificial Intelligence
sponsored by Google Cloud
WHITE PAPER: Organizations can use generative AI to boost cyber defense in intelligence, detection, response, validation, hunting, and mission control. Gen AI identifies threats, reduces manual tasks, and optimizes talent but needs human oversight. Read this white paper to learn how to integrate AI into cybersecurity while upholding security best practices.
Posted: 21 Mar 2025 | Published: 21 Mar 2025

Google Cloud

5 Must-Have Features in a Marketing Automation Platform
sponsored by Marketo
EGUIDE: Read this comprehensive list of features you should look for before choosing a marketing automation platform. See this breakdown of five key automation areas, with specific clusters of features outlined.
Posted: 08 Feb 2021 | Published: 23 Dec 2016

Marketo

Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Mar 2017

TechTarget ComputerWeekly.com

A CISO’s Guide to the AI Opportunity in Security Operations
sponsored by Exabeam
WHITE PAPER: AI is transforming cybersecurity, impacting both attackers and defenders. This guide examines AI's role in enhancing threat detection via machine learning and the challenges it poses, like advanced phishing and polymorphic malware. Discover how to assess AI solutions for your SOC and prepare for an AI-driven security future by reading the paper.
Posted: 20 Mar 2025 | Published: 20 Mar 2025

Exabeam

Ferrari Case Study
sponsored by Bitdefender
CASE STUDY: Bitdefender recently partnered with Ferrari to provide advanced threat intelligence, enabling faster detection and response to cyber threats. This case study highlights how Ferrari leverages Bitdefender's expertise to strengthen its cybersecurity posture and protect its iconic brand. Read the full case study now to learn more.
Posted: 25 Feb 2025 | Published: 04 Mar 2025

Bitdefender

MicroScope – December 2022: Dealing with rising prices
sponsored by MicroScope
EZINE: With prices rising, many are looking at what costs to cut – yet in the channel, the opposite might prove for better business. In this issue, read about how to navigate the cost issue, learn about the growing area of security, and learn about how to create a more appealing employment experience to attract talent
Posted: 01 Dec 2022 | Published: 02 Dec 2022

MicroScope

Data Integration Success Stories: 12 Solutions to the Top Data Delivery Challenges
sponsored by Qlik
EBOOK: Enterprises across industries are streamlining data pipelines with Qlik's Data Integration Platform. In this e-book, you'll learn how companies like Generali, USAA, and Fanatics accelerated data delivery, scaled data volumes, and improved data access. Read the full case studies now to learn how you can overcome top data integration challenges.
Posted: 13 Aug 2024 | Published: 14 Aug 2024

Qlik

CW APAC, October 2021: Tech Career Guide
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region
Posted: 14 Oct 2021 | Published: 14 Oct 2021

TechTarget ComputerWeekly.com

The Defender’s Advantage
sponsored by Google
EBOOK: By reading this e-book, you will understand how to activate your cyber defense with an intelligence-led approach. Read on now to learn how you can leverage threat intelligence, detection engineering, and coordinated incident response to maximize your Defender's Advantage and strengthen your cybersecurity posture.
Posted: 17 Jan 2025 | Published: 21 Jan 2025

Google

ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT: This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

APAC career guide: Becoming a cyber security pro
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.
Posted: 19 May 2022 | Published: 19 May 2022

TechTarget ComputerWeekly.com

UKtech50 2018: The 50 most influential people in UK IT
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, you will find our definitive list of the movers and shakers in UK IT – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy. This is our top 50 most influential people in UK IT for 2019.
Posted: 08 Feb 2021 | Published: 17 Dec 2018

TechTarget ComputerWeekly.com

CW Nordics - May-July 2019: Facing up to fintech
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Nordics, we take a look at how one of the Nordic region's big, traditional banks is going about meeting the challenges posed by new digital entrants into the finance sector. And it is another large traditional player, but this time in the IT world, which Nordea is turning to for support– none other than Big Blue.
Posted: 08 Feb 2021 | Published: 03 May 2019

TechTarget ComputerWeekly.com

Top 10 IT careers and skills stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Digital skills are becoming increasingly important for day-today living, as well as for navigating the world of work. With digital and technology becoming a part of every company, it is important that all citizens in the UK have at least a basic level of digital competence. Here are Computer Weekly's top 10 IT careers and skills stories of 2019.
Posted: 08 Feb 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

The Advantages of AI-Driven NDR
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores WatchGuard's cloud-native Network Detection and Response (NDR) solution, ThreatSync+. Learn how ThreatSync+ empowers smaller security teams to efficiently reduce cybersecurity risk through advanced AI-driven threat detection, network visibility, compliance, and ransomware defense. Read the full paper.
Posted: 18 Dec 2024 | Published: 11 Dec 2024

WatchGuard Technologies, Inc.