You've requested...

Cloud Surround: Managing Cybersecurity in a Digital World

If a new window did not open, click here to view this asset.

Download this next:

MicroScope January 2014: A special issue looking at software defined networking

A fresh year brings new opportunities and this could be the time many in the channel consider setting out on the journey to become an MSP or investigate the opportunities around software defined networking more closely. There are also pointers in the issue on just what is happening in the security world as well as an analysis of the rising dominance of the Nordics in data centre provision.

 

Setting out on the MSP journey

This year could be the point at which many resellers decide they will develop their business to become a managed services specialist and as Amro Gebreel discovers there is plenty of advice available about just what steps should be taken to start to transition to becoming a managed service provider.

 

A software defined world

Software defined networking is the latest development but as Billy MacInnes finds out there are other software defined options and far from being a threat for resellers this technology could prove to be a source of opportunity and growth in the year ahead.

 

Data centre growth

The UK has its fair share of data centres but as Jim Mortleman discovers there is a serious challenge coming from the Nordics where they can exploit natural geography and climate to give British and European customers an alternative home for their data.

 

This issue is sponsored by: Ingram Micro and Micro-P

These are also closely related to: "Cloud Surround: Managing Cybersecurity in a Digital World"

  • What makes a great managed security service provider?

    With an increasingly challenging threat landscape, being a successful MSSP can be a struggle. Making sure customers stay safe is critical to the success of your business, which is why understanding what makes a great MSSP is crucial for you to be able to make informed choices that will prove beneficial to the company.

  • MicroScope – June 2019: Sourcing IT among the clouds

    • XaaS models are reshaping the future of outsourcing: We investigate whether traditional outsourcing and the as-a-service model can co-exist.
    • Channel enjoys a strong start to the year: How is this year going? There is no better way to find out than ask a number of those working in the channel.
    • VAR from the madding crowd: Predatar CEO Alistair Mackenzie reflects on the transformation from VAR to MSP, highlighting some of the key milestones.

Find more content like what you just read:

  • The evolution of the agile organisation

    This research by PA Consulting finds that organisations can improve their financial performance as a result of adopting agile techniques.

    Download

  • CIO and leadership survey 2017

    This survey of 80 CIOs and IT leaders by Coeus Consulting shows the technology and financial trends facing IT leaders and businesses.

    Download

  • MicroScope: Grasp the social networking opportunity

    An issue looking at the issues around social media, the growth in unclouding and some security industry predictions for the year ahead.

    Download

  • Focus: Enterprise Mobility Management

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

    Download

  • CW APAC: Expert advice on zero-trust security

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

    Download

  • Security analytics: Enabling organisations to get ahead of attackers

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

    Download

  • IT in Europe: Taking control of smartphones: Are MDMs up to the task?

    In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.

    Download

  • Security as a service for MSP peace of mind

    Download this portfolio to learn more about WatchGuard's managed security service solutions, which give MSPs peace of mind through better endpoint management and comprehensive protection across your entire service ecosystem.

    Download

  • Royal Holloway: Secure connected and autonomous vehicles - the long road ahead

    Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.

    Download

  • Computer Weekly - 15 June 2021: Discovering great ideas - innovation at the Discovery Channel

    In this week's Computer Weekly, we talk to the owner of the Discovery Channel, about how collaboration software enabled a culture of innovation. Our latest buyer's guide looks at developments in cloud printing technology. And we hear from the technology chief at Rightmove about the online property site's digital transformation. Read the issue now.

    Download

  • SWG: Answering FAQs

    To battle proliferating web-based threats, many organizations have adopted a secure web gateway (SWG) in order to filter malicious content. For leaders interested in augmenting their SWG knowledge, this e-book can serve as a comprehensive guide. Tap into the book to unlock answers to FAQs about SWGs.

    Download

  • Top OT cybersecurity risks & how to defend against them

    As cybercriminals continue to target older operational technology (OT) systems, security leaders are pressed to bolster defenses. To help them do so, this e-book details the top risks associated with OT systems and the ways that businesses can strengthen their security stances. Read on to access these insights.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • 8 actions for stronger OT cybersecurity

    Along with digging into the major cybersecurity threats troubling OT, such as IoT botnets and malware attacks, this e-book outlines 8 actions that organizations can take to defend their OT environments. Review the book and elevate your OT security preparedness.

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • MicroScope – September 2019: Helping digital transformation

    The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future

    Download

  • MicroScope: Chart course to Covid-19 recovery

    Customers have had to react to changes caused by the pandemic, so what decisions have they made in the past year? In this issue, we explore how businesses have adapted to the new normal, different approaches to remote working, and take a look at the challenge of sustainability

    Download

  • Computer Weekly – 9 April 2019: Using data science at Sainsbury's

    In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.

    Download

  • How to implement the Essential Eight framework

    To help organizations prevent and defend against evolving cyberthreats, the Australian Cyber Security Centre (ACSC) developed the Essential Eight framework. In this e-book, access an introduction to the framework and guidance for implementing it.

    Download

  • CW APAC: Buyer’s guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

    Download

  • A Computer Weekly buyer's guide to Threat Management

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • Trust no one: Why zero trust security is taking the world by storm

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

    Download

  • A Computer Weekly buyer's guide to edge datacentres

    Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.

    Download

  • CW APAC: Trend Watch: Cloud networking

    In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

    Download

  • MicroScope: Steering IT in the right direction

    An issue looking at the timing of the ideal sales pitch and just what's happening with IoT and the channel.

    Download

  • Demystifying the myths of public cloud computing

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

    Download

  • Computer Weekly - 6 July 2021: Where to start with Windows 11

    In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.

    Download

  • CW APAC, April 2022: Trend Watch: Cyber security

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

    Download

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

    Download

  • CW APAC - March 2020: Expert Advice: Security Operations Centre

    In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.

    Download

  • Who will win the world's biggest cloud contract?

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

    Download

  • Crucial considerations for implementing a SIEM solution

    Outsourcing SIEM management to cybersecurity specialists eliminates infrastructure costs, simplifies compliance, and provides 24/7 protection. Read more on outsourcing SIEM so you can scale securely.

    Download

  • A Computer Weekly buyer's guide to intelligent workload management

    One huge advantage digital transformation brings with it is the phenomenon of intelligent workload management. In this 17-page buyer's guide, Computer Weekly looks at the various tools available, asset management best practices and the complications to look out for with hybrid and multicloud deployments.

    Download

  • MicroScope – March-April 2024: Is cloud the best option?

    In this issue, find out why cloud may not always be the right course of action for businesses to take. Also discover the growing threat artificial intelligence brings to the cyber security market, as well as read predictions on what areas will grow over the course of the year

    Download

  • Safeguard documents at every touchpoint

    Dive into this eBook to discover how Adobe Document Cloud for enterprise mitigates risks across document lifecycles with a robust, multi-layered security approach. You’ll learn how these solutions help teams maximise their technology investment.

    Download

  • A Computer Weekly buyer's guide to SIEM and SOAR

    The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.

    Download

  • Preventing identity theft in a data breach

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

    Download

  • CW APAC buyer's guide to cloud security

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

    Download

  • How SASE can protect your digital assets

    Between skyrocketing amounts of data and the IT skills shortage, organizations encounter significant obstacles on their path toward securing their digital assets. Along with digging into those challenges, this white paper explores how businesses can surmount them with SASE. Keep reading to unlock these insights.

    Download

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

    Download

  • Securing your software supply chain

    Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.

    Download

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

    Download

  • How SA Power Networks and CrowdStrike protect endpoints

    SA Power Networks is South Australia’s sole electricity distributor. With escalating threats targeting critical infrastructure, SA Power Networks had to reckon with a new level of danger. Download this case study to learn how SA Power Networks uses the CrowdStrike Falcon platform for endpoint detection and response (EDR).

    Download

  • Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race

    In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.

    Download

  • The Rise of AI in Cybersecurity: Is It a Benefit or Hazard?

    This e-book explores how AI exists as a double-edged sword in cybersecurity, as it can be leveraged for protection and destruction alike. Read on to learn about the rise of AI in cybersecurity and how to defend against AI cyberattacks.

    Download

  • Computer Weekly - 29 November 2022: How to stop data retention from killing the planet

    In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.

    Download