Focus ASEAN: Security & Digital Transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 08 Feb 2021 | Published: 11 Apr 2017
|
|
|
10 types of security incidents and how to handle them
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.
Posted: 05 Sep 2022 | Published: 06 Sep 2022
|
|
|
CW APAC buyer's guide to cloud security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
Posted: 08 Feb 2021 | Published: 07 Mar 2019
|
|
|
The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER:
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008
|
|
|
Targeted Cyber Attacks
sponsored by GFI Software
PRODUCT LITERATURE:
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007
|
|
|
Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER:
This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007
|
|
|
Strategies for successfully managing privileged accounts
sponsored by One Identity
WHITE PAPER:
One of the most important aspects of an identity security program is the management and governance of the accounts belonging to superusers — privileged accounts.
Posted: 12 Jun 2024 | Published: 12 Jun 2024
|
|
|
Computer Weekly – 20 August 2024: A gold medal for Olympic mobile coverage
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we go behind the scenes with Orange, networking partner for the Paris Olympic Games, to discuss the challenges of connecting 120 venues. We talk to a CIO for whom IT accessibility and usability is a very personal concern. And we look at how to keep control of SaaS licensing costs. Read the issue now.
Posted: 19 Aug 2024 | Published: 20 Aug 2024
|
|
|
Computer Weekly – 30 July 2024: CrowdStrike blue screen bug serves a stark warning
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we analyse the lessons from the global IT outage caused by the blue screen bug in CrowdStrike security software. We talk to the data chief of Barilla, the €4bn pasta maker, about the benefits of asking, "So what?" And we find out how Finland is taking a lead on quantum computing. Read the issue now.
Posted: 26 Jul 2024 | Published: 30 Jul 2024
|
|
|
MicroScope - November-December 2024: MSPs are the future
sponsored by MicroScope
EZINE:
The managed service model has swept the channel in recent years and looks like the approach for the long term – but does it need to change? Also, read about how to best prepare for an AI-driven future, as well as celebrate e92plus's 35 years as a distributor
Posted: 31 Oct 2024 | Published: 01 Nov 2024
|
|