Cloud Security Reports

Best practices for container security in the data center
sponsored by ComputerWeekly.com
EGUIDE: Containers present unique security challenges and data centers must learn and adapt to those challenges. Although containers might present certain unfamiliar security risks, data center admins who work with them can learn several effective ways to keep their container environments safe.
Posted: 29 Sep 2022 | Published: 29 Sep 2022

ComputerWeekly.com

CW APAC: Trend Watch: Cloud networking
sponsored by ComputerWeekly.com
EZINE: In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

ComputerWeekly.com

IDaaS-based IGA: The Better IAM Now,for Every Type of Business
sponsored by SailPoint Technologies
ANALYST REPORT: As Identity as a Service (IDaaS) continues to grow in use and relevance, security teams require knowledge about the model’s benefits. Read KuppingerCole’s analyst report to explore its key findings about IDaaS.
Posted: 29 Aug 2022 | Published: 29 Aug 2022

TOPICS:  Cloud Security
SailPoint Technologies

5 endpoint security best practices
sponsored by ComputerWeekly.com
EBOOK: With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.
Posted: 04 Aug 2022 | Published: 04 Aug 2022

ComputerWeekly.com

MicroScope – June 2022: A return to face-to-face meetings
sponsored by MicroScope
EZINE: With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel
Posted: 10 Jun 2022 | Published: 10 Jun 2022

MicroScope

Royal Holloway: Cloud-native honeypot deployment
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
Posted: 22 Apr 2022 | Published: 25 Apr 2022

ComputerWeekly.com

Choose the Right Azure Networking Service
sponsored by TechTarget
EGUIDE: Azure's cloud networking services cover various categories, such as connectivity, protection, delivery and monitoring. IT teams must ensure they choose the right service to deliver content quickly, reliably and securely.
Posted: 15 Mar 2022 | Published: 15 Mar 2022

TechTarget

Cloud-Based Identity and Security Tools for Windows Admins
sponsored by TechTarget
EGUIDE: Companies face a barrage of attacks from threat actors who try to infiltrate at all angles. See what cloud-based protections Microsoft offers to guard your organization.
Posted: 01 Mar 2022 | Published: 01 Mar 2022

TechTarget

The 8 best cloud security certifications for 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: With the number of enterprise cloud deployments growing by the day, having someone well versed in cloud security is crucial. Many professionals seeking a career in cloud security will turn to certifications to advance their learning. Here are some of the best cloud security certifications to consider in 2022.
Posted: 01 Mar 2022 | Published: 01 Mar 2022

ComputerWeekly.com

Toughening up web and mobile application security
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

ComputerWeekly.com

How to Effectively Plan Cloud Storage Scalability
sponsored by AWS
EGUIDE: Differences in storage workload scaling needs can often leave organizations wondering about where, and how, to start. Read this TechTarget expert guide to sort through cloud storage scalability benefits, limitations, and 10 planning tips to get started.
Posted: 04 Feb 2022 | Published: 02 Feb 2022

AWS

Top 10 ASEAN IT stories of 2021
sponsored by ComputerWeekly.com
EGUIDE: From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.
Posted: 28 Jan 2022 | Published: 28 Jan 2022

ComputerWeekly.com

Top 10 ANZ IT stories of 2021
sponsored by ComputerWeekly.com
EGUIDE: From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.
Posted: 28 Jan 2022 | Published: 28 Jan 2022

ComputerWeekly.com

Top 10 cloud stories of 2021
sponsored by ComputerWeekly.com
EBOOK: There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.
Posted: 24 Jan 2022 | Published: 24 Jan 2022

ComputerWeekly.com

India IT Priorities 2022: Top Observations & Trends
sponsored by ComputerWeekly.com
EGUIDE: Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how Indian enterprises are directing their IT investments and what are the main observations and trends for India in 2022.
Posted: 19 Jan 2022 | Published: 19 Jan 2022

ComputerWeekly.com

ASEAN IT Priorities 2022: Top Observations & Trends
sponsored by ComputerWeekly.com
EGUIDE: Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how ASEAN enterprises are directing their IT investments and what are the main observations and trends for ASEAN in 2022.
Posted: 19 Jan 2022 | Published: 19 Jan 2022

ComputerWeekly.com

ANZ IT Priorities 2022: Top Observations & Trends
sponsored by ComputerWeekly.com
EGUIDE: Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how ANZ enterprises are directing their IT investments and what are the main observations and trends for Australia and New Zealand in 2022.
Posted: 19 Jan 2022 | Published: 19 Jan 2022

ComputerWeekly.com

Infographic: Top IT predictions in APAC in 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
Posted: 19 Jan 2022 | Published: 19 Jan 2022

ComputerWeekly.com

SD-WAN vs. SASE: What's the difference?
sponsored by ComputerWeekly.com
INFOGRAPHIC: SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways. In this infographic, we highlight five key differences between the SASE and SD-WAN that could help businesses choose the right technology for their needs.
Posted: 11 Jan 2022 | Published: 11 Jan 2022

ComputerWeekly.com

Security Think Tank Christmas Special - The most important lessons of 2021
sponsored by ComputerWeekly.com
EBOOK: In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
Posted: 11 Jan 2022 | Published: 10 Jan 2022

ComputerWeekly.com

5 common SD-WAN challenges
sponsored by ComputerWeekly.com
INFOGRAPHIC: SD-WAN is a feature-rich technology with the ability to consolidate networking, security, reporting and management into one platform. But potential users should be aware of inherent SD-WAN challenges and deployment risk factors. In this infographic, we point out five challenges IT teams are facing when evaluating SD-WAN technologies and vendors.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

ComputerWeekly.com

CW APAC, December 2021: Expert guide to cloud migration
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the key considerations and strategies that enterprises can take when moving their workloads to public cloud
Posted: 09 Dec 2021 | Published: 09 Dec 2021

ComputerWeekly.com

What the future holds for cloud management in APAC
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we dish out useful tips from APAC organisations that have successfully migrated to the cloud, the thinking behind their approaches to cloud migration and what they are doing to not only keep the lights on, but also raise their game in areas such as cloud data management and cloud security.
Posted: 07 Dec 2021 | Published: 07 Dec 2021

ComputerWeekly.com

Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms
sponsored by Schneider Electric
WHITE PAPER: Enter this whitepaper to learn about the security aspects that go into developing and operating digital, cloud-based remote monitoring platforms built to keep data private and infrastructure systems secure from attackers.
Posted: 18 Nov 2021 | Published: 01 Aug 2016

Schneider Electric

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 04 Nov 2021 | Published: 05 Nov 2020

Beta Systems