Search Results for: security

Our Security, Delivered Your Way
Download this portfolio to learn more about WatchGuard's managed security service solutions, which give MSPs peace of mind through better endpoint management and comprehensive protection across your entire service ecosystem.

WatchGuard Technologies, Inc.

Mobile security moving to a unified approach
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

TechTarget ComputerWeekly.com

How to achieve container security best practice
In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

TechTarget ComputerWeekly.com

How to achieve container security best practice
In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

TechTarget ComputerWeekly.com

Dutch organisations demand more from government
In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

TechTarget ComputerWeekly.com

Zero trust: Taking back control of IT security
In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.

TechTarget ComputerWeekly.com

Decentralising datacentres: The new challenges of security at the edge
In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

TechTarget ComputerWeekly.com

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

TechTarget ComputerWeekly.com

Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts
This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

TechTarget ComputerWeekly.com

Policing cyber crime
This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

TechTarget ComputerWeekly.com