Search Results for: security

SME security - a business imperative
A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

TechTarget ComputerWeekly.com

CW ASEAN: Time to dial up defences
In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

TechTarget ComputerWeekly.com

Security Analytics:A popular addition to cyber defence arsenals
This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

TechTarget ComputerWeekly.com

Focus: Cyber security in the Nordics
With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

TechTarget ComputerWeekly.com

MicroScope – February 2022: Spotting the hidden security dangers
In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate

MicroScope

Getting Cloud Security Right
In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

TechTarget ComputerWeekly.com

DDoS Mitigation: Types of DDoS Attacks and Security Considerations
Our experts discuss various DDoS mitigation services and what your organization should consider before implementing cloud DDoS protection. Then, uncover the various types of DDoS attacks and the steps to take towards a more secure and reliable future.

Arbor Networks

Protecting your organisation from itself
This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

TechTarget ComputerWeekly.com

How Can Internet Hijacking be Prevented or Mitigated?
In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.

Dimension Data

Royal Holloway: Purple team playbook – threat modeling for security testing
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

TechTarget ComputerWeekly.com