Computer Weekly - 10 September 2024: The flight to data success
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how Manchester Airport Group has set course to become the world's most intelligent airport through its data-led approach. We also look at failings of AI initiatives as the tech hits roadblocks, as well as take a peak at what support networks are available to those new in the CISO role. Read the issue now.
Posted: 09 Sep 2024 | Published: 10 Sep 2024
|
|
|
Five ways SASE and SD-WAN can help improve compliance
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Security and compliance are top priorities for networking and security teams. With Zero Trust and SASE architectures, the network can become a security solution—improving connectivity experiences and compliance at the same time. Read this paper to learn how.
Posted: 01 May 2024 | Published: 01 May 2024
|
|
|
Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.
Posted: 15 Sep 2023 | Published: 19 Sep 2023
|
|
|
How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023
|
|
|
Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023
|
|
|
The future is SASE: Transform your enterprise network for good
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Less than a year after it received an official name, Secure Access Service Edge has started to disrupt the networking and security markets. As incumbent vendors make strategic moves to build SASE offerings, the nascent technology has the potential to upend traditional networking and security.
Posted: 05 Dec 2022 | Published: 05 Dec 2022
|
|
|
Best practices for container security in the data center
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Containers present unique security challenges and data centers must learn and adapt to those challenges. Although containers might present certain unfamiliar security risks, data center admins who work with them can learn several effective ways to keep their container environments safe.
Posted: 29 Sep 2022 | Published: 29 Sep 2022
|
|
|
How to get started with SASE
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Implementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.
Posted: 28 Sep 2022 | Published: 28 Sep 2022
|
|
|
5 endpoint security best practices
sponsored by TechTarget ComputerWeekly.com
EBOOK:
With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.
Posted: 04 Aug 2022 | Published: 04 Aug 2022
|
|
|
MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE:
With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022
|
|
|
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
Posted: 27 Apr 2022 | Published: 27 Apr 2022
|
|
|
CW APAC, April 2022: Trend Watch: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access
Posted: 14 Apr 2022 | Published: 14 Apr 2022
|
|
|
5 cybersecurity myths and how to address them
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
Posted: 24 Mar 2022 | Published: 24 Mar 2022
|
|
|
Ransomware: The situation at the beggining of 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.
Posted: 08 Mar 2022 | Published: 08 Mar 2022
|
|
|
Trust no one: Why zero trust security is taking the world by storm
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
Posted: 18 Feb 2022 | Published: 18 Feb 2022
|
|
|
Infographic: 5 essential open source cybersecurity tools for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
Posted: 17 Feb 2022 | Published: 17 Feb 2022
|
|
|
Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022
|
|
|
Infographic: SIEM vs. SOAR vs. XDR
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
Posted: 09 Feb 2022 | Published: 09 Feb 2022
|
|
|
The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022
|
|
|
Top 10 ASEAN IT stories of 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.
Posted: 28 Jan 2022 | Published: 28 Jan 2022
|
|
|
Top 10 ANZ IT stories of 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.
Posted: 28 Jan 2022 | Published: 28 Jan 2022
|
|
|
Infographic: Top IT predictions in APAC in 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
Posted: 19 Jan 2022 | Published: 19 Jan 2022
|
|
|
SD-WAN vs. SASE: What's the difference?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways. In this infographic, we highlight five key differences between the SASE and SD-WAN that could help businesses choose the right technology for their needs.
Posted: 11 Jan 2022 | Published: 11 Jan 2022
|
|
|
5 common SD-WAN challenges
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
SD-WAN is a feature-rich technology with the ability to consolidate networking, security, reporting and management into one platform. But potential users should be aware of inherent SD-WAN challenges and deployment risk factors. In this infographic, we point out five challenges IT teams are facing when evaluating SD-WAN technologies and vendors.
Posted: 06 Jan 2022 | Published: 06 Jan 2022
|
|
|
13 steps for enabling secure remote work
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Remote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.
Posted: 06 Jan 2022 | Published: 06 Jan 2022
|
|