You've requested...

Download this next:

Top threats to security asset management: What to know

17% of organizations report that their approach to security hygiene and posture management (SHPM) is completely decentralized, while 41% consider their approach to be only partially centralized, according to research by Enterprise Strategy Group (ESG).

Along with investigating that state of decentralization, ESG considers in this report:

  • The biggest challenges to security asset management
  • Actions you can take to improve security testing
  • Top SHPM spending priorities
  • And more

Dig into the report to unlock these insights and recommendations for boosting your organization’s SHPM.

These are also closely related to: "Security Hygiene And Posture Management"

  • NIS2 compliance requirements and solutions for industrial operations

    The EU's NIS2 directive requires cybersecurity for critical sectors. Cisco's solutions aid compliance. Their industrial products, like Catalyst switches, meet IEC 62443 standards. Cisco's Secure Development Lifecycle ensures secure engineering.

    Cisco Cyber Vision offers OT network visibility, identifying vulnerabilities for risk management. Integration with Cisco ISE enables zero trust segmentation.

    Cisco Secure Equipment Access provides secure remote access with least privilege and multifactor authentication.

    With vast OT experience and an integrated security suite, Cisco supports industries in meeting NIS2 compliance. Visit Cisco's resources to secure operations.

  • 7 findings about exposure management in 2024

    In 2023, the XM Cyber Continuous Exposure Management (CEM) platform uncovered more than 40 million exposures.

    So, what findings did those exposures illuminate? In this 35-page research report, XM Cyber breaks down 7 key findings, including that 56% of critical asset exposures are in cloud platforms.

    To discover the rest, and to deepen your understanding of the state of exposure management in 2024, dig into the report.

Find more content like what you just read:

  • Putting NIS2 into Context: A Guide to Compliance

    The EU's updated cybersecurity legislation, NIS2, strengthens security requirements for critical infrastructure. Learn how the Sonatype platform can help organizations address NIS2 compliance challenges and enhance software development processes. Read the 7-page white paper.

    Download

  • Compare 8 vulnerability-management strategies

    As advanced threats flood the cyber landscape, how can your business ensure strong vulnerability management? Along with comparing 8 strategies, including risk-based vulnerability management (RBVM) and Red Team exercises, this e-book introduces Continuous Threat Exposure Management (CTEM). Keep reading to access the full insights.

    Download

  • Tanium for Cyber Insurance

    Managing and protecting the thousands of devices that are connected to your network has never been more challenging. Cyber insurance is a key tool to mitigate the associated risks. Explore 10 steps for assessing cyber risk for cyber insurance when you download this guide.

    Download

  • Upstack Digest Cybersecurity

    This complimentary digest is filled with advice from UPSTACK experts in the trenches of today’s cyberwar.

    Download

  • Cyber attackers exploiting poor cloud security

    More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene

    Download

  • Cloud security leader’s guide to detection & response

    The current cloud infrastructure landscape has evolved at a pace that very few can keep up with, leaving many industry professionals and leaders without the necessary knowledge, visibility, and tools they need to stay ahead. Access this report to learn more.

    Download

  • Building industrial security capabilities to drive compliance

    With an increase in cyberattacks, organizations in the industrial sector need to invest significant resources in understanding their responsibilities and ensuring compliance. This white paper details the main requirements of NIS2 and how organizations can benefit from the Cisco security portfolio to drive compliance. Read on to learn more.

    Download

  • Five Key Capabilities to Secure Against Endpoint Risk

    Legacy endpoint security solutions don’t just miss modern threats — they slow down security operations, drain resources, and increase overall risk. In this eBook, uncover five key capabilities for a modern endpoint security approach and see how improved detection capabilities protect against all types of threats.

    Download

  • Explore the power of native cloud detection and response services

    The pace of cloud innovation has outpaced many organizations' ability to secure their cloud environments. This report examines the challenges of cloud detection and response, and how AWS native services can help security teams improve threat detection and response capabilities. Read the full Enterprise Strategy Group Showcase to learn more.

    Download

  • Discover, govern, and secure your most critical data

    Wherever there is data, there is risk. Organizations can no longer afford to not secure their critical data, and need a solution that can monitor and defend data wherever it lives. SailPoint Data Access Security extends identity security controls so you can easily discover and govern unstructured data. Read on to learn more.

    Download

  • NIS2 and European boards: 2024 analyst report by ESG

    By the end of 2024, this report by Enterprise Strategy Group (ESG) explains, the “Network and Information Systems 2 (NIS2) directive of the European Union will significantly affect Union countries and nation-states in its periphery.” So, what will that impact look like? Unlock insights in the report.

    Download

  • 3 simple steps for stopping ransomware attacks

    Ransomware exploits the trends that have come to define modern business, taking advantage of the many entry points within today’s digital environments. This white paper aims to help you overcome the threat of ransomware, providing 3 simple steps you can use to increase your security capabilities. Download the white paper now to learn more.

    Download

  • Enterprise Strategy Group: Native detection and response services

    The cloud's rapid evolution has left many security teams struggling to detect and respond to threats in cloud environments. This ESG Showcase examines how AWS native detection and response services can help organizations enhance cloud security posture and streamline operations. Read the full report for more insights.

    Download

  • In 2017, the insider threat epidemic begins

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

    Download

  • How great is your risk of ransomware? An assessment

    Ransomware has become a booming business, complete with its own ecosystem of suppliers, specializations, and affiliate programs. Similarly, detecting and stopping a ransomware attack requires a coordinated effort — one that is risk-informed. In this eBook, learn how to evaluate your organization’s risk in the face of rising ransomware threats.

    Download

  • 3 key concepts of a prevention-first security strategy

    With cloud threats evolving, organizations find themselves exposed and at risk. In response, they need a new more proactive approach to cloud security. This whitepaper outlines Check Point’s new Cloud Security paradigm, which emphasizes a unique technology stack. Read on to learn more.

    Download

  • Ransomware in 2024: What should you expect?

    To learn about trends in ransomware in Q1 2024, and to unlock predictions about ransomware in 2024, tap into this 6-page research report by CyberMaxx.

    Download

  • CW APAC, June 2020: Trend Watch - data protection

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

    Download

  • Beginner's guide to Internet of Things

    The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.

    Download

  • CW Benelux - May-July 2019: A new vision for hackers

    With canal bridges, healthcare products, bicycles, ship components, buildings and even prosthetic body parts already in the scope of 3D printing, it's facinating to imagine how far the technology can go. Printing spaceships is no longer a fantasy. Read the issue now.

    Download

  • 5 Cybersecurity Best Practices

    Along with highlighting trends and major risks in cybersecurity in 2023, this report maps out 5 best practices for security success. #1: Reduce your attack surface by segmenting your network and removing any SaaS applications that are no longer necessary for your organization. Continue on to uncover the rest.

    Download

  • The modern crypto landscape for digital businesses

    As digital business grows, securing connections and data is essential. This report explores how crypto-agility enables organizations to quickly adapt encryption as standards evolve, including for quantum computing threats. Learn how to build a modern digital trust infrastructure. Read the full report.

    Download

  • Security leader’s guide to multi-cloud identity security

    Within today’s multi-cloud environments, identities serve the role traditionally performed by the perimeter, rendering your workforce as your key line of defense.Download this white paper to learn about the CyberArk Insight to Action framework and unlock 6 steps to achieve identity security in a multi-cloud environment.

    Download

  • Guide to CMS security best practices & protocols

    Today, a company’s content management system (CMS) has become highly vulnerable to cyberattacks. However, understanding the keys to proper CMS security can be difficult, making the efforts to do seem daunting. Browse this guide to learn more.

    Download

  • Top IT Predictions in APAC in 2023

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

    Download

  • A Computer Weekly buyer's guide to Threat Management

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

    Download

  • MDR: The key to mastering cyber risk management & more

    As organizations continue to search for new ways to reduce costs while staying better protected, many IT leaders have turned to building their active threat mitigation strategies, including managed detection and response (MDR) tactics. But what exactly is MDR? Browse this guide to learn more.

    Download

  • Cybersecurity guide for K–12 environments

    Because K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.

    Download

  • Log More to Improve Visibility and Enhance Security

    ph

    Download

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

    Download

  • Strategic leader’s guide to MSP security

    One major development in the wake of digital transformation is that all organizations with a digital presence are now accessible to cyberattacks. This e-book looks at cybersecurity from every angle, exploring the advantages of using a multivendor Managed Security Services Provider (MSSP) to protect the network. Read on to learn more.

    Download

  • CW ASEAN: Time to dial up defences

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

    Download

  • Stemming the threat of high-risk credentials

    For cybersecurity, the unfettered buildup of cloud architecture is like a powder keg, and the larger it grows, the more the spark of high-risk access credentials threatens your organization. This white paper covers identity security compliance challenges, benefits, and best practices for securing your AWS cloud. Read on to learn more.

    Download

  • How to secure multi-cloud estates

    How can organizations minimize compromised access in the cloud? This white paper covers identity security and the challenges and benefits of cloud compliance to reduce security risk. Read on to learn about best practices to secure identities in the cloud as well as three phases to achieve cloud identity security success.

    Download

  • Verizon SASE: Providing scalable security for growing businesses

    After suffering a series of attacks, this UK-based manufacturing company realized that their security couldn’t scale to meet their growing needs. By partnering with Verizon, they implemented a SASE solution that protects their network from threats and laid the groundwork for a scalable security framework going forward. Read on to learn more.

    Download

  • Chart your path to success by unlocking the power of your data

    In this e-book, explore how organizations are innovating to drive business outcomes, what's blocking them, and how they can take advantage of new technologies like generative AI as an innovation accelerator.

    Download

  • The Managed Detection & Response Landscape

    Organizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • Inside 2024 threat trends & defense tactics for 5 ransomware variants

    Ransom demands are increasing 20% year-over-year, “Artic Wolf Labs Threat Report 2024” finds, rising to a staggering $600,000 USD. How can you defend your business against that dangerous trend? And what other threats should you watch out for in the cyber landscape? Dig into the report to unlock insights.

    Download

  • Pros, cons, and challenges of cloud-native application protection

    Cloud-native application protection platforms (CNAPPs) aim to simplify cloud security, but vendor offerings vary. Understand the good, bad, and ugly of CNAPPs to select a solution that consolidates cloud security without compromising detection and response. Read the white paper to learn more.

    Download

  • 2024 state of security posture: Findings from 300 leaders

    In XM Cyber’s “The 2024 State of Security Posture Survey Report,” which unpacks insights from 300 security leaders, review 6 key findings about strategies for exposure remediation and more.

    Download

  • Identity governance will be a key to NIS2 Compliance

    In January 2023, the European Union's (EU) updated Network and Information Security Directive, NIS2, came into force, giving member states 21 months to comply. In this report, IDC analysts provide insight into the new legislation, highlighting the most important areas.

    Download

  • Identity governance key for NIS2 compliance

    The NIS2 Directive will require EU organizations to enhance their cybersecurity risk management and governance. Identity governance is crucial for compliance, automating identity processes and providing AI-driven risk detection. Read the full analyst report to learn how identity security solutions can help your organization prepare for NIS2.

    Download

  • Keys to stronger cybersecurity in higher education

    Increasing ransomware attacks, shrinking IT teams: These are two of the many challenges that higher education institutions encounter on the road to stronger cybersecurity. Along with digging into those factors and their implications, this white paper explores how to level up a school’s security posture. Read on to unlock these insights.

    Download

  • Securing your business against evolving cyber threats: A guide

    Businesses face an evolving array of cyber threats. Proactive, holistic security is key - with continuous monitoring, threat intelligence, and incident response. Learn how an advanced MDR solution can help protect your organization from modern threats. Read the e-book to discover more.

    Download

  • CW ASEAN, November 2018: Blockchain is no 'magic wand' for security

    Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.

    Download

  • Comprehensive Guide to Security Operations

    Despite sizeable budgets and an array of technology solutions at their disposal, most security teams can barely keep up with the bombardment of threats targeting IT environments as the attack surface continues to expand. Access this guide to learn a pragmatic approach to reducing the risk and impact of an attack and improving security resiliency.

    Download