Security Protocols Reports

Focus: Securing for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 08 Feb 2021 | Published: 10 Jan 2017

TechTarget ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com

Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

How to Approach Storage Disaster Recovery
sponsored by Rubrik
EGUIDE: In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
Posted: 22 Aug 2016 | Published: 18 Aug 2016

Rubrik

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Is Managed Security Monitoring Right for Your Organization?
sponsored by IBM
WHITE PAPER: The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
Posted: 07 Nov 2016 | Published: 25 Jul 2016

IBM

IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
sponsored by Aruba Networks
EGUIDE: The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
Posted: 09 Sep 2016 | Published: 07 Sep 2016

Aruba Networks

Computer Weekly – 21 February 2023: Innovation not infestation – digitising pest control
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Rentokil Initial is using digital innovations to improve the age-old task of pest control. Leading experts offer a 15-point plan to improve diversity and inclusion in IT. And with all the excitement around ChatGPT, we ask whether business is ready to use the AI chatbot. Read the issue now.
Posted: 22 Sep 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com