EGUIDE:
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
EZINE:
In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
EZINE:
In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
EGUIDE:
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
EZINE:
In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
INFOGRAPHIC:
IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
EGUIDE:
In this e-guide: Software for marketing, from content marketing through customer experience management to marketing automation, and the rest, has not been as central to the vision of CIOs as ERP and the full panoply of IT infrastructure: storage, security, networking, data centres, and all of the above delivered by way of the cloud.
WHITE PAPER:
Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
EGUIDE:
In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.