CW ASEAN: Defend against disruption
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018
|
|
|
CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018
|
|
|
Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018
|
|
|
The rise of the MSSP
sponsored by MicroScope
EGUIDE:
In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.
Posted: 08 Feb 2021 | Published: 11 Jun 2018
|
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
MicroScope – May 2018: Bundles deliver surprise package for SMEs
sponsored by MicroScope
EZINE:
An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.
Posted: 08 Feb 2021 | Published: 01 May 2018
|
|
|
Data protection: A business imperative
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 08 Feb 2021 | Published: 24 Apr 2018
|
|
|
Demystifying the myths of public cloud computing
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
Posted: 08 Feb 2021 | Published: 27 Mar 2018
|
|
|
Infosec culture: A former helicopter pilot's perspective
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 08 Feb 2021 | Published: 26 Mar 2018
|
|
|
CW ASEAN: Time to dial up defences
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Feb 2021 | Published: 08 Mar 2018
|
|
|
Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018
|
|
|
CW Nordics ezine February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE:
In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 08 Feb 2021 | Published: 22 Feb 2018
|
|
|
Computer Weekly – 13 February 2018: On the path to diversity in tech
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2018
|
|
|
Computer Weekly – 30 January 2018: Davos debates global tech risks
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Jan 2018
|
|
|
Updates: The next evolution of operating systems
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
Posted: 08 Feb 2021 | Published: 16 Jan 2018
|
|
|
Cloud: A security risk and opportunity
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.
Posted: 08 Feb 2021 | Published: 15 Jan 2018
|
|
|
Computer Weekly – 9 January 2018: Countdown to GDPR
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Jan 2018
|
|
|
CIO Trends #6: Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
Posted: 08 Feb 2021 | Published: 15 Dec 2017
|
|
|
Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017
|
|
|
CW Benelux November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
Posted: 08 Feb 2021 | Published: 09 Nov 2017
|
|
|
Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
Posted: 08 Feb 2021 | Published: 27 Oct 2017
|
|
|
Security Analytics:A popular addition to cyber defence arsenals
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 08 Feb 2021 | Published: 09 Oct 2017
|
|
|
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
Posted: 08 Feb 2021 | Published: 13 Sep 2017
|
|
|
Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 08 Feb 2021 | Published: 12 Sep 2017
|
|
|
CW Europe – September-November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
Posted: 08 Feb 2021 | Published: 07 Sep 2017
|
|