4 cloud API security best practices
sponsored by AT&T
EGUIDE:
API use and capabilities have grown significantly over the past decade to improve application development; interaction with services and app features; and integration with applications, services and components of all types. Nowhere is this truer than in the cloud, where API availability and use are the norm rather than the exception.
Posted: 28 Mar 2023 | Published: 28 Mar 2023
|
|
|
Drive Security Resilience with Secure Firewall
sponsored by Cisco
WHITE PAPER:
This paper introduces the benefits of Cisco Secure Firewall for driving security resilience across your hybrid and multicloud environment. View its benefits and core features here, including actionable intelligence that enables you to prioritize and share critical threat information so you can rapidly respond.
Posted: 21 Mar 2023 | Published: 21 Mar 2023
|
|
|
CW APAC: Buyer's guide to SASE
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.
Posted: 15 Mar 2023 | Published: 15 Mar 2023
|
|
|
Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023
|
|
|
Top 11 cloud security challenges and how to combat them
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Many organizations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023
|
|
|
The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023
|
|
|
Top 10 India IT stories of 2022
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this roundup, we recap the top 10 stories in India, including the digitisation work undertaken by global firms in the country, progress made by local enterprises in harnessing technology and how a female coder rose through the ranks in her software development career.
Posted: 15 Jan 2023 | Published: 16 Jan 2023
|
|
|
Top IT Predictions in APAC in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.
Posted: 19 Dec 2022 | Published: 20 Dec 2022
|
|
|
Best practices for container security in the data center
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Containers present unique security challenges and data centers must learn and adapt to those challenges. Although containers might present certain unfamiliar security risks, data center admins who work with them can learn several effective ways to keep their container environments safe.
Posted: 29 Sep 2022 | Published: 29 Sep 2022
|
|
|
CW APAC: Trend Watch: Cloud networking
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
Posted: 14 Sep 2022 | Published: 14 Sep 2022
|
|
|
IDaaS-based IGA: The Better IAM Now,for Every Type of Business
sponsored by SailPoint Technologies
ANALYST REPORT:
As Identity as a Service (IDaaS) continues to grow in use and relevance, security teams require knowledge about the model’s benefits. Read KuppingerCole’s analyst report to explore its key findings about IDaaS.
Posted: 29 Aug 2022 | Published: 29 Aug 2022
|
|
|
5 endpoint security best practices
sponsored by TechTarget ComputerWeekly.com
EBOOK:
With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.
Posted: 04 Aug 2022 | Published: 04 Aug 2022
|
|
|
MicroScope – June 2022: A return to face-to-face meetings
sponsored by MicroScope
EZINE:
With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel
Posted: 10 Jun 2022 | Published: 10 Jun 2022
|
|
|
Royal Holloway: Cloud-native honeypot deployment
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
Posted: 22 Apr 2022 | Published: 25 Apr 2022
|
|
|
The 8 best cloud security certifications for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
With the number of enterprise cloud deployments growing by the day, having someone well versed in cloud security is crucial. Many professionals seeking a career in cloud security will turn to certifications to advance their learning. Here are some of the best cloud security certifications to consider in 2022.
Posted: 01 Mar 2022 | Published: 01 Mar 2022
|
|
|
Toughening up web and mobile application security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
Posted: 09 Feb 2022 | Published: 09 Feb 2022
|
|
|
Top 10 ASEAN IT stories of 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.
Posted: 28 Jan 2022 | Published: 28 Jan 2022
|
|
|
Top 10 ANZ IT stories of 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.
Posted: 28 Jan 2022 | Published: 28 Jan 2022
|
|
|
Top 10 cloud stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK:
There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.
Posted: 24 Jan 2022 | Published: 24 Jan 2022
|
|
|
India IT Priorities 2022: Top Observations & Trends
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how Indian enterprises are directing their IT investments and what are the main observations and trends for India in 2022.
Posted: 19 Jan 2022 | Published: 19 Jan 2022
|
|
|
ASEAN IT Priorities 2022: Top Observations & Trends
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how ASEAN enterprises are directing their IT investments and what are the main observations and trends for ASEAN in 2022.
Posted: 19 Jan 2022 | Published: 19 Jan 2022
|
|
|
ANZ IT Priorities 2022: Top Observations & Trends
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how ANZ enterprises are directing their IT investments and what are the main observations and trends for Australia and New Zealand in 2022.
Posted: 19 Jan 2022 | Published: 19 Jan 2022
|
|
|
Infographic: Top IT predictions in APAC in 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
Posted: 19 Jan 2022 | Published: 19 Jan 2022
|
|
|
SD-WAN vs. SASE: What's the difference?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways. In this infographic, we highlight five key differences between the SASE and SD-WAN that could help businesses choose the right technology for their needs.
Posted: 11 Jan 2022 | Published: 11 Jan 2022
|
|
|
Security Think Tank Christmas Special - The most important lessons of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
Posted: 11 Jan 2022 | Published: 10 Jan 2022
|
|