EGUIDE:
Despite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.
EZINE:
In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
RESEARCH CONTENT:
The purpose of incorporating micro-segmentation as part of a larger Zero Trust security strategy is to prevent threat actors from moving laterally within a network – but how effective is micro-segmentation in practice? Read this research report for an in-depth analysis of the capabilities, challenges and potential benefits of micro-segmentation.
EGUIDE:
Based on real-world scenarios and written by industry experts who have been in the trenches, Secure Beyond Breach is a practical guide that details how to implement a micro-segmentation strategy from start to finish. It's an essential read for all cybersecurity professionals, from security architects to IT infrastructure teams to CISOs.
RESEARCH CONTENT:
The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
EZINE:
In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
BLOG:
To assist your efforts in staying up to date, Integrity360 has pulled together this Threat Intel Roundup report that spotlights attacks, cybersecurity updates, and data loss incidents from April 2022 onward. Stay up to date, and protect your business from the latest hacker tactics, by downloading the full report here.
EGUIDE:
What is at the heart of a cybersecurity risk assessment? Find out by browsing this expert TechTarget guide on How to Perform a Cybersecurity Risk Assessment in 5 Steps. Inside, the guide provides can’t-miss advice on how to conduct these assessments in your business.
EZINE:
In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.
EGUIDE:
Read the following custom TechTarget e-guide on Why Companies Need Cybersecurity and Cyber Resilience to demystify the definition of cybersecurity and learn how to align it with cyber resilience in your organization.