Infographic: Top IT predictions in APAC in 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
Posted: 19 Jan 2022 | Published: 19 Jan 2022
|
|
|
SD-WAN vs. SASE: What's the difference?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways. In this infographic, we highlight five key differences between the SASE and SD-WAN that could help businesses choose the right technology for their needs.
Posted: 11 Jan 2022 | Published: 11 Jan 2022
|
|
|
5 common SD-WAN challenges
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
SD-WAN is a feature-rich technology with the ability to consolidate networking, security, reporting and management into one platform. But potential users should be aware of inherent SD-WAN challenges and deployment risk factors. In this infographic, we point out five challenges IT teams are facing when evaluating SD-WAN technologies and vendors.
Posted: 06 Jan 2022 | Published: 06 Jan 2022
|
|
|
13 steps for enabling secure remote work
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Remote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.
Posted: 06 Jan 2022 | Published: 06 Jan 2022
|
|
|
Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021
|
|
|
Simplify your security operations (e-book)
sponsored by Red Hat
EBOOK:
77% of organizations plan to implement automation to speed up security response times. Does yours? Dive into this e-book to learn about the benefits of an automation platform and how you can simplify your security operations center.
Posted: 01 Dec 2021 | Published: 21 Mar 2023
|
|
|
Infographic: Top 12 risk management skills
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.
Posted: 01 Nov 2021 | Published: 25 Oct 2021
|
|
|
Network security in the post-pandemic era
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends.
Posted: 27 Oct 2021 | Published: 27 Oct 2021
|
|
|
Infographic: 7 steps to secure your home wi-fi network
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Wi-Fi security, in particular, has evolved. While the days of war driving and finding home networks open to exploit may be over, home Wi-Fi security could still go sideways in many places. Here are seven recommendations to make sure your home Wi-Fi network is secure.
Posted: 25 Oct 2021 | Published: 25 Oct 2021
|
|
|
Implementing a Zero-Trust Approach to Network Security
sponsored by TechTarget
RESOURCE:
Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 04 Oct 2021 | Published: 04 Feb 2020
|
|
|
A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 06 Jul 2021 | Published: 06 Jul 2021
|
|
|
The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021
|
|
|
Zero Trust Guide
sponsored by Atlassian
WHITE PAPER:
Inside this white paper, find the current state of workplace security, the basic principles of the Zero-Trust security model, and how you can begin your journey towards a Zero Trust-secure workplace environment.
Posted: 11 Jun 2021 | Published: 28 Feb 2020
|
|
|
The rise of edge computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture
Posted: 18 May 2021 | Published: 19 May 2021
|
|
|
Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER:
The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021
|
|
|
Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE:
As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 26 Mar 2021 | Published: 01 May 2021
|
|
|
Ofcom raise over £1.3bn in new 5G spectrum auction
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.
Posted: 18 Mar 2021 | Published: 18 Mar 2021
|
|
|
How Maryland's leading healthcare provider has adopted a SASE approach to improve security and build patient trust with Cisco Umbrella
sponsored by Cisco Secure
CASE STUDY:
Frederick Health needed a secure and efficient solution at the cloud edge that could provide granular controls for users no matter where they connect from. Frederick Health turned to Cisco to provide a SASE architecture and deployed DNS-layer security, secure web gateway and firewall functionality from Cisco Umbrella.
Posted: 16 Mar 2021 | Published: 16 Mar 2021
|
|
|
A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 08 Oct 2021 | Published: 08 Oct 2021
|
|
|
SASE & Zero Trust: Your Network Security Guide
sponsored by Aruba Networks
EGUIDE:
Learn about the top 5 benefits of SASE and how it enables zero-trust network access.
Posted: 26 Aug 2021 | Published: 25 Aug 2021
|
|
|
Ofcom raise over £1.3bn for new 5G spectrum auction
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.
Posted: 06 Aug 2021 | Published: 06 Aug 2021
|
|
|
A Computer Weekly Buyers Guide to 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
Posted: 01 Jul 2021 | Published: 01 Jul 2021
|
|
|
Why CISOs need advanced network security strategies now
sponsored by TechTarget Security
EZINE:
Network security has to move beyond the basics. With systems and data under assault by sophisticated attackers, CISOs and other security leaders need to put in place advanced network security strategies that incorporate the latest technologies -- AI, machine learning and more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021
|
|
|
Threat detection and response demands proactive stance
sponsored by TechTarget Security
EBOOK:
Cyberthreat volume, velocity and vectors are surging, taxing already stressed security teams. The time for a new cybersecurity approach is here. Threat detection and response tools are evolving just in time, as are the techniques to combat security alert fatigue.
Posted: 09 Apr 2021 | Published: 09 Apr 2021
|
|
|
SD-WAN: The Most Critical Design Considerations
sponsored by NBN
EGUIDE:
Experts agree that SD-WAN is the most efficient way to direct network traffic throughout your WAN and lower costs, but you have to ensure you choose the option that meets your architecture, business and performance needs. Access this expert e-guide to delve into the most critical considerations for designing your SD-WAN architecture.
Posted: 01 Apr 2021 | Published: 10 Feb 2021
|
|