You've requested...

Aberdeen Study: Laptop Lost or Stolen? Five Questions to Ask and Answer

If a new window did not open, click here to view this asset.

Download this next:

Mice & keyboards shortcut the way to wellness

As companies transition to hybrid and remote work environments, how can they help their employees feel comfortable from a distance?

Discover 3 small peripheral adjustments that make a big impact on driving companywide efforts for improved employee wellbeing in this white paper.

These are also closely related to: "Aberdeen Study: Laptop Lost or Stolen? Five Questions to Ask and Answer"

  • To hack back or not to hack back ...

    New deception techniques like “hack back” promise to fool cyber criminals, reduce false positives, and increase visibility over traditional honeypot strategies. They can provide security intelligence that would not be otherwise available.

    But deception techniques could instigate the attackers even further. Are your network, your team and your business ready to handle the potential repercussions?

    This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.

  • Overcoming IoT expasion challenges with Zero Trust

    According to a Palo Alto report, IoT devices comprised 30% of all enterprise devices. With companies continuing to incorporate more devices into their enterprise network, and with cyberthreats on the rise, companies can no longer rely on a circle of trust.

    This e-book aims to provide organizations with a means of overcoming the dangers inherent to IoT expansion by developing a zero-trust model that can effectively secure a diverse array of devices.

    Access the full e-book and begin your IoT zero-trust journey today.

    By downloading this asset, I acknowledge that I want to receive related communications from Palo Alto Networks, and acknowledge their privacy statement https://www.paloaltonetworks.com/legal-notices/privacy

Find more content like what you just read:

  • How to improve your cloud DLP

    This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.

    Download

  • CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT

    The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.

    Download

  • Best cloud security certifications

    Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove their knowledge to potential employers. Are you trying to figure out which certifications will most advance your knowledge and career? Download this infographic to get the lowdown on the best cloud security certifications.

    Download

  • CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital

    Heineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.

    Download

  • 2022 Middle East IT Priorities Infographic: Budgets and Buying Patterns

    In this infographic, learn more about the most popular IT projects in the Middle East for 2022 and what companies are investing in more than before the pandemic.

    Download

  • CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase

    Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.

    Download

  • Seven Wonders of the HPC World

    This 11-page e-book demystifies the definition of HPC and the power of supercomputing by illustrating 7 innovative use cases to consider. Browse your copy to learn how HPC supports the James Webb Space Telescope (JWST), models wildfire behavior, cracks cardiovascular disease, and your company.

    Download

  • CW Middle East ezine April 11 2019

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

    Download

  • MicroScope – May 2018: Bundles deliver surprise package for SMEs

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

    Download

  • CW Middle East July to Sept 2016:

    In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.

    Download

  • Enfrentando de frente as questões de desempenho dos microserviços

    With the number of enterprise cloud deployments growing by the day, having someone well versed in cloud security is crucial. Many professionals seeking a career in cloud security will turn to certifications to advance their learning. Here are some of the best cloud security certifications to consider in 2022.

    Download

  • Demystifying the myths of public cloud computing

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

    Download

  • CW Nordics August 2018

    In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.

    Download

  • Benelux focus: Moving to the cloud

    We look at the evolution of cloud computing take up, with some examples from the Netherlands, then we analyse some of the challenges and opportunities cloud computing brings.

    Download

  • CW APAC buyer's guide to cloud security

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

    Download

  • Innovation First: Building the Mindset, Leadership, and Culture for a Customer-Centric Business

    From creating a cloud-based digital production platform to combining disparate multimodal data sets, organizations everywhere continue to double-down on cloud investments to streamline infrastructure management and drive business innovation. Browse this e-book to examine cloud innovation tactics for your company.

    Download

  • Why is there an ethical debate around AI?

    This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.

    Download

  • How cloud changes everything, IoT creates risk, and APM saves businesses

    The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.

    Download

  • Nordics focus: Moving to the cloud

    We focus on cloud computing take up in the Nordic region and feature articles that will help CIOs anywhere in the world on their cloud journeys.

    Download

  • 8 key characteristics of cloud computing

    When it comes to building and deploying modern applications, companies rely on the cloud. From the ability to manage automation, costs, performance, compliance, and security, cloud provides flexibility that sets it apart from on-premises IT architectures. In this e-guide, explore the 8 key characteristics of cloud computing.

    Download

  • How APAC is riding the cloud wave

    In this e-guide, find out why artificial intelligence is set to be the cloud's killer app, how Aussie firms are managing data in the cloud, and the Singapore government's move to develop its own cloud technology stack.

    Download

  • CW Nordics August 2019: Copenhagen woos tech startups

    Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.

    Download

  • How equipment as a service (EaaS) transforms after-sales into revenue

    After-sales support is no longer an afterthought—and what’s more, it can be up to 5 times more profitable than selling the machine itself. Read this e-book to maximize your after-sales profits and support, with easy-to-comprehend guidance to assist you along the way.

    Download

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

    Download

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

    Download

  • Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

    In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.

    Download

  • CW Benelux ezine August 2018

    It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".

    Download

  • Focus: Securing the cloud

    While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.

    Download

  • CW Europe – September-November 2017

    In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.

    Download

  • CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company

    It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.

    Download

  • Nordic banks increase collaboration with fintech startups

    The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.

    Download

  • Gartner: Top 10 strategic technology trends in 2020

    Two decades ago, at the start of the millennium, IT was deeply concerned about Y2K – and the iPhone, Twitter and Facebook didn't exist. So what's in store as a new decade begins?

    Download

  • Infographic: Top 10 Technology Trends 2019

    In this infographic, discover the top 10 technology trends for 2019 as predicted by Gartner. For digital-minded CIOs, Gartner's 2019 top 10 technology trends should come as no surprise: IT is getting smarter, casting an intelligent digital web over the enterprise -- and everywhere else.

    Download

  • February ezine: Look to the future

    An issue with plenty of predictions about what the year ahead holds for the channel

    Download

  • BlackCat emerges as one of the top ransomware threats

    After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

    Download

  • Mazars Transforms to be More Agile by Migrating to the Cloud

    While operating a growing business sounds great, it often comes with major IT infrastructure challenges. Download this case study to see how accounting and advisory firm Mazars went from bogged down by IT maintenance to a company optimized by cloud.

    Download

  • Private cloud management: What enterprises need to know in 2021

    In this e-guide, we take a look at how one company has negotiated the move from private to public cloud, while also shining a light on the challenges enterprises face when running private cloud environments and what they can do to overcome them.

    Download

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

    Download

  • Next generation network security

    In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.

    Download

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

    Download

  • CW Europe – December 2017

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

    Download

  • MicroScope – November 2023: Team up for peak success

    In this issue, we explore the need to handle pitches and collaboration carefully to create more opportunities as an increasing amount of IT spending goes via partners. Also discover Canalys' predictions for the use of generative AI, and just what exactly it means when we talk 'cyber security'

    Download

  • Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

    This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.

    Download

  • CW Nordics ezine February 2018

    In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.

    Download

  • CW Europe – March-May 2019: Robots deliver savings for Dutch postal service PostNL

    European businesses have bought into the digital revolution, with the adoption of the latest technologies like automation enabling companies to transfer their internal operations.

    Download

  • Focus: Private cloud

    The private cloud is often viewed as a stepping stone for enterprises keen to tap into the business agility benefits of cloud without ceding total control over where their applications and workloads run. For some organisations, such deployments act as a test bed environment, where they can work out where best to run their workloads.

    Download

  • Cloud: A security risk and opportunity

    With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.

    Download

  • CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres

    Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.

    Download

  • MicroScope – December 2020: Reasons to be positive for 2021

    In this issue, discover why the continued digital transformation trend means 2021 is looking good for the channel. Also read how business processes can be optimised by adding artificial intelligence to the mix, and how the channel is looking at the challenge of sustainability

    Download

  • Multicloud challenges: From security to provisioning

    In this expert-guide, explore how the growth of the multicloud has impacted networking strategies from security to provisioning. Then, read on to learn how a cloud management platform can help you solve these challenges, as well as what capabilities it must have to be effective.

    Download