Government Security Reports

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

The Security Risks of Network Sensors in the Enterprise
sponsored by IBM
EGUIDE: In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.
Posted: 17 Oct 2016 | Published: 11 Oct 2016

IBM

Technical Guide on Government Security
sponsored by TechTarget Security
EGUIDE: Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Posted: 26 May 2011 | Published: 23 May 2011

TechTarget Security

Computer Weekly – 5 April 2016: Seven steps to digital leadership
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.
Posted: 04 Apr 2016 | Published: 05 Apr 2016

TechTarget ComputerWeekly.com

Presentation Transcript: WWW - World Wide Weaponization
sponsored by ESET
PRESENTATION TRANSCRIPT: The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 10 Nov 2009 | Published: 10 Nov 2009

ESET

Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.
Posted: 12 Jul 2021 | Published: 13 Jul 2021

TechTarget ComputerWeekly.com

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell Technologies
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Computer Weekly – 5 July 2016: How will UK IT adapt after Brexit?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the aftershocks continue from the UK's decision to leave the European Union, we look at the implications and challenges for the UK technology community. Our latest buyer's guide examines expense management software. And IT leaders discuss the question – can you trust your technology? Read the issue now.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

TechTarget ComputerWeekly.com

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now.
Posted: 02 Dec 2011 | Published: 02 Dec 2011

TechTarget ComputerWeekly.com