Computer Emergency Response Teams

Computer Emergency Response Teams Reports
Infographic: Who needs to be on your digital transformation team?
sponsored by ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by SearchCRM
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchCRM

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by SearchSecurity.com
EZINE: Today's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
Posted: 16 Nov 2016 | Published: 11 Nov 2016

SearchSecurity.com

A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER: It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

Stikeman Elliott LLP: IT Team Offers Legal Team More Functionality in their BlackBerry Smartphones
sponsored by BlackBerry
CASE STUDY: Access this case study to learn how a busy, mobile legal team successfully developed a Blackberry application to easily look up contact lists, access internal information about their firm and have an emergency communications system in place.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by ComputerWeekly.com
EZINE: In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 12 Mar 2020 | Published: 19 Mar 2020

ComputerWeekly.com

Top 10 ASEAN IT stories of 2017
sponsored by ComputerWeekly.com
EGUIDE: In this review of the top 10 Computer Weekly articles on IT in ASEAN, we look at what countries across the region are doing to drive adoption of emerging technologies such as artificial intelligence (AI) and the internet of things (IoT), raise their cyber security capabilities amid growing cyber threats, and draw more women into the IT industry.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

ComputerWeekly.com

Sensible one-page thoughts on managing performance
sponsored by ComputerWeekly.com
EGUIDE: Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of short, digestible articles, written especially for Computer Weekly.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Information Security ANZ Nov 2015
sponsored by TechTarget ANZ
EZINE: In this issue we look at the true cost of a data breach to an Australian organisation.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

All resources sponsored by TechTarget ANZ

Technical Guide on Emerging Threats
sponsored by SearchSecurity.com
EGUIDE: It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

SearchSecurity.com

Facing up to emerging technology: Risks and benefits
sponsored by SearchCIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

SearchCIO

The Role of Emerging Technology in Digital Transformation
sponsored by CompTIA
WHITE PAPER: Emerging technology may have become a highly hyped concept, but businesses that cut through the hype can find ways to build competitive advantage. Download this white paper now for insights to help you evaluate how you can best leverage today's emerging technology.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

CompTIA

Top 10 Australian IT stories of 2017
sponsored by ComputerWeekly.com
EGUIDE: In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to improve work productivity, upgrade its supercomputing infrastructure, harness the internet of things to improve business operations and realise its space ambitions.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

ComputerWeekly.com

BlackCat emerges as one of the top ransomware threats
sponsored by ComputerWeekly.com
EBOOK: After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.
Posted: 04 May 2022 | Published: 04 May 2022

ComputerWeekly.com

Emerging PaaS security tactics
sponsored by SearchSecurity.com
EGUIDE: Like all other cloud deployments, PaaS introduces some security concerns because of underlying security features that are beyond the customer’s control. This e-guide explores these challenges and lists security areas that can affect the risk profile of deployed applications, as well as offers key advice for mitigating risk.
Posted: 02 May 2012 | Published: 02 May 2012

SearchSecurity.com

CW Buyer's Guide to Emerging technology
sponsored by ComputerWeekly.com
EBOOK: The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

ComputerWeekly.com

Market Guide for Extended Detection and Response
sponsored by Cybereason
ANALYST REPORT: XDR is an emerging technology that can offer improved threat prevention, detection and response capabilities for security operations teams. This Gartner research provides strategic guidance for understanding and evaluating the applicability of XDR platforms for their needs. Read on to learn more.
Posted: 04 Feb 2022 | Published: 05 Feb 2022

TOPICS:  .NET
Cybereason

Computer Weekly - 7 December 2021: Spy tech gets high tech – why MI6 invests in startups
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we're used to James Bond and his gadgets, but now MI6 is investing in tech startups to develop new intelligence capabilities. Our exclusive IT Priorities survey suggests IT leaders are optimistic about 2022. And our new buyer's guide examines the latest emerging technologies. Read the issue now.
Posted: 06 Dec 2021 | Published: 07 Dec 2021

ComputerWeekly.com

Market Guide For Extended Detection And Response
sponsored by Palo Alto Networks
ANALYST REPORT: XDR is an emerging technology that can offer improved threat prevention, detection, and response capabilities for security operations teams. This Gartner research provides strategic guidance for SRM leaders to understand and evaluate the applicability of XDR platforms for their needs. Read on to get started.
Posted: 01 Apr 2022 | Published: 01 Apr 2022

TOPICS:  .NET
Palo Alto Networks

Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 14 Jul 2020 | Published: 15 Jul 2020

ComputerWeekly.com

Emergency Management Plans Made Easy & Practical
sponsored by VMware, Inc.
EGUIDE: Your DR plan covers immediate incident response, but does it address long-term post-crisis support? Learn about the key phases of an effective emergency management program - from prevention to resolution - by reading this exclusive SearchSMBStorage.com E-Guide.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

VMware, Inc.

Threat detection and response demands proactive stance
sponsored by SearchSecurity.com
EBOOK: Cyberthreat volume, velocity and vectors are surging, taxing already stressed security teams. The time for a new cybersecurity approach is here. Threat detection and response tools are evolving just in time, as are the techniques to combat security alert fatigue.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

SearchSecurity.com

How software-defined infrastructure shapes compute resources
sponsored by VMware, Inc.
EGUIDE: This expert e-guide details the impact a software-defined data center will have on your computing resources.
Posted: 20 Nov 2013 | Published: 20 Nov 2013

VMware, Inc.

Empowering R&D Through Digital Transformation
sponsored by Rescale
WHITE PAPER: Since the success of your company hinges on the products you bring to market and the speed with which you do it, your Research and Development (R&D) team should be a top priority. Use this guide to ensure that you’re investing in the right resources to better enable your R&D team. Save the guide here.
Posted: 15 Mar 2021 | Published: 17 Feb 2021

Rescale

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Extended Detection and Response (XDR)
sponsored by Fortinet, Inc.
EGUIDE: Extended detection and response (XDR) is emerging as one of the most effective ways to combat today’s increasingly sophisticated cyberthreats. But what exactly is XDR? This e-guide provides a comprehensive overview of XDR, including best practices, use cases, and how to select the right XDR tool – read on to get started.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Cybersecurity
Fortinet, Inc.