You've requested...

Download this next:

Top APAC security predictions for 2020

Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.

These are also closely related to: "The definitive guide to data protection"

  • Secure remote access: More vital than ever thanks to Covid-19

     

     

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

     

     

  • The Top Cyber Security Trends in ASEAN in 2017

    For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. The region has taken heed of the call, particularly with the discovery of nearly 9,000 command and control servers in a multinational operation led by Interpol. That said, there’s much more to be done. Singapore CIOs, for one, are still concerned with cloud security and are unprepared to deal with cyber attacks. In this e-guide, read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.

Find more content like what you just read:

  • The rise of the MSSP

    In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • Kaspersky XDR Expert: Total business visibility & protection

    Kaspersky's XDR Expert offers complete visibility, correlation, and automation across endpoints, networks, and cloud against complex cyberthreats. The on-premises solution guarantees data sovereignty and provides open architecture for easy integration. Discover more in Kaspersky's full overview.

    Download

  • Disaster recovery has never been so easy or important

    Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.

    Download

  • CW ASEAN: Time to dial up defences

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

    Download

  • CW Benelux August 2017

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

    Download

  • In 2017, the insider threat epidemic begins

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

    Download

  • Zero Trust Network Access Leadership Guide

    The market for Zero Trust Network Access (ZTNA) solutions has undergone significant growth. Access this Leadership Compass report to see why Akamai was named a Leader in all four categories (Innovation, Product, Market, and Overall) and ensure you choose the right ZTNA for your needs.

    Download

  • 2017 Salary Survey - ASEAN

    We recently asked our members to share their experiences around IT salary and career goals. With results from 730+ IT pros in ASEAN we were able to dentify some key employment trends and find out more about training, qualifications and diversity in IT departments. Read the results here and see how your salary compares.

    Download

  • MicroScope – June 2020: The surge in home working

    The shift by many to home working has created opportunities and challenges for the channel as it looks to help customers through the changes. Also discover the importance of diversity in your workforce, and how Covid-19 is affecting IT events

    Download

  • CW APAC: Expert advice on zero-trust security

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

    Download

  • MicroScope – October 2019: What's next for the channel?

    The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly

    Download

  • MicroScope – July 2020: MSPs lend a helping hand

    In this issue, read about how the Covid-19 pandemic has allowed for managed services players to show their worth, and discover how the use of collaborative tools has made businesses consider how to make conference calls more engaging

    Download

  • September ezine: Thinking digital in the world of storage

    The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry

    Download

  • September ezine: Thinking digital in the world of storage

    The full report of the recent MicroScope storage roundtable discussing how cloud and GDPR has changed the industry

    Download

  • Large Enterprises: Consider Your MSSP Options

    Take a look through this “ISG Provider Lens Quadrant” report to learn about 27 MSSPs that can support the needs of large enterprises.

    Download

  • MSSP landscape: The leaders, their capabilities & more

    Review this “ISG Provider Lens Quadrant” report to compare the strengths, challenges and capabilities of 20 top MSSPs for midsize enterprises.

    Download

  • CW Europe: December 2016 - February 2017

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

    Download

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

    Download

  • The CISO's guide to supply chain security

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

    Download

  • MicroScope – February 2021: The forecast on channel security

    MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working

    Download

  • Security analytics: Enabling organisations to get ahead of attackers

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

    Download

  • MicroScope – January 2022: Squaring up to ransomware

    In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

    Download

  • MicroScope – December 2020: Reasons to be positive for 2021

    In this issue, discover why the continued digital transformation trend means 2021 is looking good for the channel. Also read how business processes can be optimised by adding artificial intelligence to the mix, and how the channel is looking at the challenge of sustainability

    Download

  • Why hyper-converged infrastructure could improve overall IT performance

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

    Download

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

    Download

  • Desktop Admin for BYOD: Security Chapter

    The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.

    Download

  • E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats

    This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.

    Download

  • Data Protection 101: Essential Steps for Holistic Information Security

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

    Download

  • Mobile Data Security and Compliance Challenges in the Enterprises

    The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.

    Download

  • An effective mobile device security policy

    Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.

    Download

  • The call for data-centric security in a hybrid world

    Over 50% of organizations globally have suffered a ransomware attack that blocked access to systems or data — and more than 20% say the affected data was valuable, sensitive, or secret. With hybrid work increasingly the norm, those numbers are rising.

    Download

  • Mobile data protection best practices

    Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

    Download

  • Ensure your backups meet compliance standards

    In the event of a data breach or cyberattack, you never want a client to lose their valuable data. That’s why backup monitoring is crucial for maintaining security and compliance. Read on to learn about best practices for meeting compliance standards and mitigating risk for your clients and your organization.

    Download

  • Top Mobile Data Protection Best Practices

    Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.

    Download

  • Data governance more important now than ever

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

    Download

  • Expert Guide to web 2.0 Threats: How to Prevent an Attack

    A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.

    Download

  • Jargon buster guide to GDPR

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

    Download

  • Best Practices for Mobile Data Protection

    This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace the trend toward using personal devices for business.

    Download

  • CW APAC, June 2020: Trend Watch - data protection

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

    Download

  • Data protection, a live issue that affects us all

    Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.

    Download

  • eGuide: Email Security and Compliance Best Practices

    Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.

    Download

  • ISM Essentials Guide on Cloud and Virtualization Security

    Moving applications, development and data to the cloud means a new paradigm of IT and security management. You’ll need clear visibility into how data moves outside your organization, where it’s stored and who has access to it. This essential guide from ISM offers expert advice on security around your organization’s cloud computing efforts.

    Download

  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.

    Download

  • Navigating the GDPR

    Today’s businesses encounter not only rising cyberattacks but also regulations with stringent requirements. To help organizations navigate that challenging landscape, this white paper presents best practices for complying with the EU’s GDPR. Keep reading to unlock insights.

    Download