3DES Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

TechTarget Security

How to use a public key and private key in digital signatures
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents.
Posted: 04 Jul 2023 | Published: 04 Jul 2023

TechTarget ComputerWeekly.com

Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Aug 2019

TechTarget ComputerWeekly.com

Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016

TechTarget ComputerWeekly.com

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

What's the Best Way to Handle External Security Auditors?
sponsored by Dell Software
EGUIDE: A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
Posted: 08 Feb 2021 | Published: 05 Oct 2016

Dell Software

Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
Posted: 08 Feb 2021 | Published: 15 Mar 2017

TechTarget ComputerWeekly.com

Unified Risk Posture: A CISO’s Guide to Reducing Risk and Complexity
sponsored by Cloudflare
EBOOK: Dieser CISO-Leitfaden beschreibt einen einfacheren Ansatz, der die wichtigsten Phasen des Managements der Risikoposition auf einer einzigen Plattform vereint. Dieser einheitliche Ansatz ermöglicht es Ihnen, Risiken dynamisch zu bewerten, Risikosignale auszutauschen und Kontrollen in sich entwickelnden IT-Umgebungen durchzusetzen.
Posted: 26 Sep 2024 | Published: 26 Sep 2024

TOPICS:  .NET
Cloudflare

Royal Holloway: Security evaluation of network traffic mirroring in public cloud
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com

The Best Destinations for Remote Work
sponsored by Remote
EBOOK: With remote work continuing to be the norm for most organizations, employees are no longer restricted to living near major cities or other urban hubs for top job opportunities. Work can now be done from anywhere, and with so many possibilities, it leaves many to ask: where should you go? Browse this guide to learn more.
Posted: 30 Mar 2024 | Published: 30 Mar 2024

TOPICS:  .NET
Remote

Cloud Performance Report: 2022 Edition
sponsored by Cisco ThousandEyes
RESEARCH CONTENT: In order to understand the state of cloud performance, Cisco Thousand Eyes performed measurements through vantage points connected to Tier 2, Tier 3, as well as cloud backbone networks. This report provides an analysis of the performance and connectivity architectures of the top 3 public cloud providers. Read on to learn more.
Posted: 14 Aug 2024 | Published: 14 Aug 2024

TOPICS:  .NET
Cisco ThousandEyes

Demystifying the myths of public cloud computing
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
Posted: 08 Feb 2021 | Published: 27 Mar 2018

TechTarget ComputerWeekly.com

The Business Value of Data Engineering
sponsored by Software AG
RESEARCH CONTENT: StreamSets' report, based on surveys from 523 data engineers and 778 business data consumers, reveals the value of data engineering. It highlights the need for engineers to grasp business impact, better collaboration, and factors for job satisfaction. Discover how to maximize your data team's potential in the report.
Posted: 17 Jul 2024 | Published: 17 Jul 2024

Software AG

CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TechTarget ComputerWeekly.com

How To Deploy A Password Policy
sponsored by Specops Software
EBOOK: This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.
Posted: 25 Sep 2024 | Published: 25 Sep 2024

Specops Software

UNIT 42 Managed Services Threat Report Summary
sponsored by Palo Alto Networks
RESEARCH CONTENT: The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
Posted: 05 Oct 2024 | Published: 05 Oct 2024

Palo Alto Networks

CW Europe – June 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.
Posted: 08 Feb 2021 | Published: 08 Jun 2017

TechTarget ComputerWeekly.com

CW Nordics - August-October 2022: Norway struggles to keep up with demand for tech specialists
sponsored by TechTarget ComputerWeekly.com
EZINE: The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies.
Posted: 04 Aug 2022 | Published: 25 Aug 2022

TechTarget ComputerWeekly.com

CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT
sponsored by TechTarget ComputerWeekly.com
EZINE: Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.
Posted: 01 Sep 2022 | Published: 09 Sep 2022

TechTarget ComputerWeekly.com

CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres
sponsored by TechTarget ComputerWeekly.com
EZINE: Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
Posted: 22 Mar 2022 | Published: 07 Apr 2022

TechTarget ComputerWeekly.com

CW Europe – September-November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
Posted: 08 Feb 2021 | Published: 07 Sep 2017

TechTarget ComputerWeekly.com

Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
WHITE PAPER: In this deep-diving white paper — designed for companies in the data center industry or wishing to report on their data center operations — discover why there 5 often-misunderstood categories for environmental sustainability reporting metrics that need to be at the core of your sustainability strategy.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

TOPICS:  .NET
Schneider Electric

Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
EBOOK: To find out how your organization can improve both the accuracy of your sustainability tracking in the data center and the utility of your ESG reports, download this essential guide to environmental sustainability metrics.
Posted: 12 Mar 2024 | Published: 12 Mar 2024

TOPICS:  .NET
Schneider Electric

Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 08 Feb 2021 | Published: 02 Oct 2018

TechTarget ComputerWeekly.com

Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.
Posted: 04 Jun 2021 | Published: 08 Jun 2021

TechTarget ComputerWeekly.com

Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021

TechTarget ComputerWeekly.com

CIO Trends #2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.
Posted: 08 Feb 2021 | Published: 26 Jul 2016

TOPICS:  CIOs
TechTarget ComputerWeekly.com

Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.
Posted: 16 Apr 2021 | Published: 20 Apr 2021

TechTarget ComputerWeekly.com

Computer Weekly - 10-16 September 2019: A tech boost for social care
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
Posted: 08 Feb 2021 | Published: 10 Sep 2019

TechTarget ComputerWeekly.com