Search Results for: security

Why zero trust is IT security's best hope
This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

TechTarget ComputerWeekly.com

SIEM IT Decision Center- Checklist #1
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.

TechTarget Security

Focus: IT Security in the Middle East
In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.

TechTarget ComputerWeekly.com

CW ASEAN: Time to dial up defences
In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

TechTarget ComputerWeekly.com

SIEM IT Decision Center- Checklist #2
This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.

TechTarget Security

Getting Cloud Security Right
In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

TechTarget ComputerWeekly.com

SME security - a business imperative
A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

TechTarget ComputerWeekly.com

DDoS Mitigation: Types of DDoS Attacks and Security Considerations
Our experts discuss various DDoS mitigation services and what your organization should consider before implementing cloud DDoS protection. Then, uncover the various types of DDoS attacks and the steps to take towards a more secure and reliable future.

Arbor Networks

Security Analytics:A popular addition to cyber defence arsenals
This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

TechTarget ComputerWeekly.com

Protecting your organisation from itself
This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

TechTarget ComputerWeekly.com