You've requested...

Download this next:

Who should get the technology vote in the UK General Election?

In this week’s Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties’ election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology.

These are also closely related to: "AppDetective"

  • Web-facing applications: Security assessment tools and strategies

    Businesses continue to create web applications that offer improved access to information. Unfortunately, this online presence has created an area that’s vulnerable to security threats and web application security assessments that often fall short.

    Consult this expert E-guide to learn more about properly discovering web application threats. Discover the tools you need for protection and how you can mitigate likely threats by consulting this resource now. 

  • E-Guide: Database Tools for Auditing and Forensics

    Database auditing requires more than just the right tools: those tools also have to be properly configured to offer the information that's needed and database performance that's required.

    This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.

Find more content like what you just read:

  • Proactive Security: Software vulnerability management and beyond

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

    Download

  • Computer Weekly – 25 August 2020: When algorithms don't play fair

    In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.

    Download

  • Avoiding the Oracle traps and risks with AWS solutions

    Download this e-book to learn how you can identify all the cost traps and risks around Oracle licensing and technologies, and implement best-practices, solutions, and strategies to minimize them in AWS.

    Download

  • Enhancing database security with Zero Trust

    Browse this white paper to discover why and how to apply Zero Trust to your business’s database security.

    Download

  • What to do when a zero-day attack strikes

    Picture this: A known vulnerability has been discovered in your network, but there is no known exploit code. You are now facing a race against time to remediate this emerging threat before it does considerable damage. Watch this webinar to see how a security expert assesses this troubling situation and remediates a zero-day exploit live in action.

    Download

  • CW APAC: Trend Watch: Database technology

    In this handbook, focused on database technology in the Asia-Pacific region, Computer Weekly looks at the impact of graph databases and the different types of database management systems currently on the market.

    Download

  • Royal Holloway: Securing connected and autonomous vehicles

    This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.

    Download

  • Infographic: Comparing cloud database security

    More data than ever before is being put into cloud-based storage repositories. Leading cloud providers offer an array of storage options, yet databases remain the most common choice in today's enterprises. Because databases are updated so frequently, it's important to review their security controls regularly.

    Download

  • Jargon buster guide to database management

    This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.

    Download

  • Inside the successful projects that rely on NoSQL database applications

    Check out this white paper for a look inside the modern challenges that NoSQL databases address, as well as when to choose NoSQL over relational and why.

    Download

  • Aligning Ransomware Protection and Recovery Plans with Critical Capabilities

    A multi-layered security framework is important for data security because it helps to provide several defenses to cover data security gaps that may exist within your infrastructure. Download this e-book to learn how to improve your data security and align internal teams for better ransomware protection.

    Download

  • Taking stock of database technologies

    Database technologies have evolved over decades, from relational databases to NoSQL databases that make it easier to store & handle data in the cloud. In this e-guide, how organisations are addressing database management challenges & how Alibaba is using cloud-native databases to reduce downtime in its annual Singles' Day sales.

    Download

  • Infographic: Advantages and disadvantages of key-value databases

    Different database types exist to serve different purposes. This sometimes makes the choice of the right type of database to use obvious. While key-value databases may be limited in what they can do, they are often the right choice for many different situations. Here are the main advantages and disadvantages of key-value databases.

    Download

  • Ransomware readiness assessments: 101 guide

    In the face of increasingly sophisticated ransomware attacks, many businesses are working to bolster their defenses. One step your organization can take toward accomplishing that goal is to leverage a ransomware readiness assessment. For a 101 guide to such assessments, explore this blog post.

    Download

  • Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?

    In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.

    Download

  • How CM.com improved their application security

    CM.com has become a global leader in cloud software for conversational commerce that enables businesses to deliver a customized customer experience. By partnering with Contrast Security, CM.com were able to overhaul their application security. Read on to learn more.

    Download

  • Demystifying the myths of public cloud computing

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

    Download

  • Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?

    In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.

    Download

  • Compliance Field Guide: Reducing Costs in an Increasingly Regulated World

    This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.

    Download

  • Databases and your unique environment: Your comprehensive guide

    In this comprehensive for dummies e-book, discover how Nutanix can help you tackle and tame the most challenging aspects of controlling a flexible database solution while bringing down costs.

    Download

  • OWASP Top Ten: How to keep up

    The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.

    Download

  • Oracle - Autonomous computing that declines a special name

    In this e-guide, follow Oracle's twin paths to adding AI and delivering software over the cloud – on its own platform and infrastructure as a service, from 2017 to 2018. An over-arching theme of Oracle's case regarding its infusion of machine learning and its declared re-architecting of its cloud delivery has been security, security, security.

    Download

  • 4 reasons to consider cloud database migration

    When it comes to cloud database migrations, it can be hard to weigh the many benefits of a migration with its various drawbacks. This web post helps you consider this important decision by exploring the top 4 reasons behind cloud database migrations. Check it out to explore some key factors behind why organizations move their DBs to the cloud.

    Download

  • IT in Europe E-Zine – The Cloud Issue

    There is enormous competitive advantage to be gained by organisations that understand how to take advantage of the opportunities for innovation that the cloud represents. In this month's IT in Europe, we aim to help point you in the right direction.

    Download

  • Graph database: Enable real-time decisions at scale

    Organizations today are turning to multi-model, multi-cloud databases that can be effective and efficient when dealing with different scenarios. Read on to learn about such a database and discover how you can leverage it to make real-time decisions at scale.

    Download

  • How to achieve better database performance and consolidate your data center

    Discover in this detail-packed infographic how your organization can boost Oracle Database performance by moving from older servers to 16th Generation Dell PowerEdge R960 servers with Intel Xeon Scalable processors.

    Download

  • A Computer Weekly buyer's guide to graph databases

    In this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.

    Download

  • DevSecOps: A comprehensive guide

    Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.

    Download

  • Computer Weekly – 25 July 2023: Getting comfortable with data

    In this week's Computer Weekly, we talk to the head of IT at furniture retailer DFS about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.

    Download

  • Thorough network assessments: An example

    In this e-book, discover an example of a thorough network assessment by Net Reply that examines a company’s data center, cloud connectivity and more.

    Download

  • Market guide for attack surface management for 2024 & beyond

    Access this report to learn about key vendors for attack surface management, as well as ASM's functions such as asset discovery and risk scoring, noting the importance of integrating ASM with other security tools for a robust defense.

    Download

  • Virtualization for Dummies eBook

    Integrating cloud apps with in-house legacy apps can be a challenge but with the emergence of SaaS integration tools, it's now easier than ever for organizations to do it themselves. Access this eBook to learn how to assess how cloud apps will integrate into your current environment, must know key terms related to cloud app integration and more.

    Download

  • How to achieve container security best practice

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

    Download

  • How to achieve container security best practice

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

    Download

  • Securing the complex, distributed enterprise

    As edge expansion, the Internet of Things (IoT), distributed (remote) workforces, and more continue to generate and consume more data, companies are put at risk of that information being siloed and compromised. Browse this white paper to learn the best ways you can keep up with the digital transformation.

    Download

  • e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks

    Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them.

    Download

  • Simplify database management with Nutanix Database Service

    Discover in this product overview how Nutanix delivers predictable, non-disruptive scaling of compute and storage as database demands for your enterprise continue to grow.

    Download

  • Bitdefender Pen Testing: 6 benefits for web, mobile, & networks

    Bitdefender Offensive Services go beyond vulnerability assessment by identifying key security weaknesses so they can be remediated, in addition to customized Penetration (Pen) Testing. Find out how your company could benefit from employing Bitdefender Offensive Services by downloading this solution overview

    Download

  • Buyer’s guide to API solutions

    This guide outlines key considerations for securing APIs. Discover the API ecosystem, map dependencies, and implement runtime protection. Read now to learn how to evaluate API security solutions.

    Download

  • Modernizing the Mainframe: Preserve IT Investments, Manage Risk

    Fragmented data, exceeded budget, data risk—these are 3 challenges common to mainframe modernization. To avoid these challenges and facilitate a smooth transformation, many organizations utilize a tool or service. One such service is Application Migration Methodology (AMM). Read this white paper to understand AMM’s 5 steps.

    Download

  • Application security: best practices and risks

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

    Download

  • A Computer Weekly buyer's guide to NoSQL

    There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.

    Download

  • Application security testing: Protecting your application and data

    Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.

    Download

  • Oracle cloud applications exhibit pragmatic adoption curve

    Oracle prides itself on the full suite of the business applications it offers in the cloud, arguably ahead of its closest rival, SAP – which has prioritised building on its in-memory database Hana over the cloud per se, though its S/4 Hana ERP system is increasingly delivered over the cloud, too.

    Download

  • Floor & Decor ensures comprehensive and efficient security with Contrast Security

    By using Contrast Security solutions, Floor & Décor has been able to better identify, remediate, and avoid potentially impactful security events such as the Log4j/Log4Shell incident. In fact, the company’s applications were protected from the vulnerability even before it was publicly known. Access the case study to learn more.

    Download

  • Streamline PostgreSQL with DBaaS for faster app dev

    Nutanix Database Service streamlines PostgreSQL management to reduce costs, while empowering developers to deploy DBs in minutes and automate tasks. Read the product overview to learn how NDB simplifies fleet management and empowers developers.

    Download

  • Guide to the Cybersecurity Maturity Model Certification (CMMC) compliance

    The Cybersecurity Maturity Model Certification (CMMC) framework is designed to support and guide MSPs working with the US Department of Defense. This white paper presents a guide to the CMMC, breaking down the essential information so that you can navigate its more complex features. Read on to learn more.

    Download