Search Results for: security

CIO Trends #10: Nordics
Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.

TechTarget ComputerWeekly.com

IT Priorities 2020: After Covid-19, security goes back to basics
This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.

TechTarget ComputerWeekly.com

Focus: Infosec17
Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

TechTarget ComputerWeekly.com

Panda Adaptive Defense 360 Technologies
In an era of sophisticated ransomware and increasingly frequent cyberattacks, MSPs need to make sure they have comprehensive security capabilities. Access this white paper to learn how Panda Adaptive Defense 360 offers a full protection stack including endpoint protection technology, zero-trust defense, and contextualized behavior detection.

WatchGuard Technologies, Inc.

GoSecure Cybersecurity Perceptions Versus Reality
This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.

GoSecure

Infosec culture: A former helicopter pilot's perspective
In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to SIEM and SOAR
The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.

TechTarget ComputerWeekly.com

IT Priorities 2018 - What's happening in security?
In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

TechTarget ComputerWeekly.com

VMs vs. containers: Which is better for security?
Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

TechTarget ComputerWeekly.com

CW ASEAN: Defend against disruption
In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

TechTarget ComputerWeekly.com