Security Management

Security Management Reports
MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

MITRE ATT&CK: Climb to the top
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

ComputerWeekly.com

Transforming risk Why digital transformation depends on integrated risk management
sponsored by ServiceNow
EBOOK: Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.
Posted: 14 Apr 2022 | Published: 14 Apr 2022

ServiceNow

All together now
sponsored by ServiceNow
WHITE PAPER: 2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
Posted: 14 Apr 2022 | Published: 14 Apr 2022

ServiceNow

CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
sponsored by ComputerWeekly.com
EZINE: Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
Posted: 14 Mar 2022 | Published: 16 Mar 2022

ComputerWeekly.com

Trust no one: Why zero trust security is taking the world by storm
sponsored by ComputerWeekly.com
EGUIDE: As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
Posted: 18 Feb 2022 | Published: 18 Feb 2022

ComputerWeekly.com

Infographic: 5 essential open source cybersecurity tools for 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
Posted: 17 Feb 2022 | Published: 17 Feb 2022

ComputerWeekly.com

Infographic: SIEM vs. SOAR vs. XDR
sponsored by ComputerWeekly.com
INFOGRAPHIC: IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

ComputerWeekly.com

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

Top 10 cyber security stories of 2021
sponsored by ComputerWeekly.com
EBOOK: Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022

ComputerWeekly.com

CW APAC: CIO trends
sponsored by ComputerWeekly.com
EZINE: In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead
Posted: 14 Jan 2022 | Published: 14 Jan 2022

ComputerWeekly.com

Security Think Tank Christmas Special - The most important lessons of 2021
sponsored by ComputerWeekly.com
EBOOK: In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
Posted: 11 Jan 2022 | Published: 10 Jan 2022

ComputerWeekly.com

Infographic: 5 cybersecurity predictions for 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

ComputerWeekly.com

The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *
sponsored by Bitdefender
RESEARCH CONTENT: Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
Posted: 04 Jan 2022 | Published: 30 Nov 2020

Bitdefender

Everything You Need to Know About the Log4j Vulnerability
sponsored by TechTarget
EGUIDE: Here, dig into the origins of the Log4J vulnerability, the severity, and what needs to change to ensure enterprise systems aren't at risk in the future.
Posted: 17 Dec 2021 | Published: 17 Dec 2021

TechTarget

HOW TO DESIGN YOUR SECURITY OPERATIONS CENTER (SOC)TO WORK SMARTER, NOT HARDER
sponsored by Splunk
WHITE PAPER: At the moment, security teams are dealing with limited resources and talent to stop unrelenting, advancing threats. This presents challenges for security operations centers (SOCs), but through more proactive security methods, these challenges can be alleviated. Read this white paper to learn how to design your SOC to work smarter, not harder.
Posted: 22 Nov 2021 | Published: 08 Apr 2021

Splunk

The SIEM Buyer's Guide for 2021
sponsored by Splunk
EGUIDE: SIEM has become a core component of modern cybersecurity programs – enabling organizations to detect and act on threats before they strike. The following SIEM buyer’s guide provides a deep dive into the evolution of SIEM, its essential features, key capabilities and what the 2021 SIEM landscape looks like – read on to get started.
Posted: 22 Nov 2021 | Published: 04 Dec 2020

Splunk

The Essential Guide to Foundational Security Procedures
sponsored by Splunk
WHITE PAPER: Download your complimentary copy of “The Essential Guide to Foundational Security Procedures” to learn how to build standard security procedures, respond to threats quickly with orchestrated workflows, and leverage Splunk Phantom for orchestration and automation.
Posted: 22 Nov 2021 | Published: 11 Aug 2020

Splunk

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 18 Nov 2021 | Published: 30 Jun 2020

Proofpoint

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 18 Nov 2021 | Published: 05 Jun 2020

Proofpoint

SIMPLIFIED RACF MANAGEMENT
sponsored by Beta Systems
DATA SHEET: Access this data sheet from Beta Systems to learn about _beta access for RACF, a solution that delivers simple administration, monitoring, and auditing of your z/OS security system, replacing the costly tools you use today while providing the same functionality.
Posted: 04 Nov 2021 | Published: 13 Nov 2020

Beta Systems

Network Security Management For IT and industrial Networks
sponsored by Beta Systems
WHITE PAPER: Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.
Posted: 04 Nov 2021 | Published: 10 Feb 2020

Beta Systems

Business Infrastructure Control System – BICS
sponsored by Beta Systems
DATA SHEET: Up to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see. In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.
Posted: 04 Nov 2021 | Published: 10 Feb 2020

Beta Systems

Six Myths of SIEM
sponsored by IBM
WHITE PAPER: Traditionally, SIEM solutions were complex and targeted towards larger organizations. But with the need for security solutions ever-increasing, progressive SIEM vendors cater to businesses of all sizes.In this white paper, uncover the top 6 myths about SIEM and what organizations should expect from SIEM today. Read on to learn more.
Posted: 20 Oct 2021 | Published: 06 Oct 2020

IBM

CW APAC, October 2021: Tech Career Guide
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region
Posted: 14 Oct 2021 | Published: 14 Oct 2021

ComputerWeekly.com