Cyber Security Reports

Top 10 ASEAN IT stories of 2022
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Despite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.
Posted: 15 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
Posted: 21 Feb 2022 | Published: 22 Feb 2022

TechTarget ComputerWeekly.com

Efficacy Of Micro-segmentation Assessment Report
sponsored by Illumio
RESEARCH CONTENT: The purpose of incorporating micro-segmentation as part of a larger Zero Trust security strategy is to prevent threat actors from moving laterally within a network – but how effective is micro-segmentation in practice? Read this research report for an in-depth analysis of the capabilities, challenges and potential benefits of micro-segmentation.
Posted: 28 Dec 2021 | Published: 04 Jun 2020

TOPICS:  Cybersecurity
Illumio

Secure Beyond Breach: A Practical Guide
sponsored by Illumio
EGUIDE: Based on real-world scenarios and written by industry experts who have been in the trenches, Secure Beyond Breach is a practical guide that details how to implement a micro-segmentation strategy from start to finish. It's an essential read for all cybersecurity professionals, from security architects to IT infrastructure teams to CISOs.
Posted: 28 Dec 2021 | Published: 03 Mar 2021

TOPICS:  Cybersecurity
Illumio

Royal Holloway: Attack mapping for the internet of things
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
Posted: 13 May 2022 | Published: 13 May 2022

TechTarget ComputerWeekly.com

Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
Posted: 30 May 2022 | Published: 31 May 2022

TechTarget ComputerWeekly.com

Threat Intel Roundup
sponsored by Integrity360
BLOG: To assist your efforts in staying up to date, Integrity360 has pulled together this Threat Intel Roundup report that spotlights attacks, cybersecurity updates, and data loss incidents from April 2022 onward. Stay up to date, and protect your business from the latest hacker tactics, by downloading the full report here.
Posted: 24 Aug 2022 | Published: 24 Aug 2022

TOPICS:  Cybersecurity
Integrity360

How to Perform a Cybersecurity Risk Assessment in 5 Steps
sponsored by Koris365
EGUIDE: What is at the heart of a cybersecurity risk assessment? Find out by browsing this expert TechTarget guide on How to Perform a Cybersecurity Risk Assessment in 5 Steps. Inside, the guide provides can’t-miss advice on how to conduct these assessments in your business.
Posted: 25 Jul 2022 | Published: 21 Jul 2022

TOPICS:  Cybersecurity
Koris365

Computer Weekly – 29 March 2022: Ten years of the Raspberry Pi
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.
Posted: 25 Mar 2022 | Published: 29 Mar 2022

TechTarget ComputerWeekly.com

Why Companies Need Cybersecurity and Cyber Resilience
sponsored by Koris365
EGUIDE: Read the following custom TechTarget e-guide on Why Companies Need Cybersecurity and Cyber Resilience to demystify the definition of cybersecurity and learn how to align it with cyber resilience in your organization.
Posted: 25 Jul 2022 | Published: 22 Jul 2022

TOPICS:  Cybersecurity
Koris365