CIO Trends #10: Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.
Posted: 16 Jan 2020 | Published: 16 Jan 2020
|
|
|
CIO Trends #10: Benelux
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.
Posted: 16 Jan 2020 | Published: 16 Jan 2020
|
|
|
Top APAC security predictions for 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
Posted: 15 Jan 2020 | Published: 16 Jan 2020
|
|
|
Top 10 cyber security stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
Posted: 23 Dec 2019 | Published: 23 Dec 2019
|
|
|
Data protection, a live issue that affects us all
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.
Posted: 16 Dec 2019 | Published: 16 Dec 2019
|
|
|
CW Europe December 2019: Deutsche Bank creates innovation division
sponsored by TechTarget ComputerWeekly.com
EZINE:
German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
Posted: 03 Dec 2019 | Published: 12 Dec 2019
|
|
|
Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 21 Oct 2019 | Published: 21 Oct 2019
|
|
|
VMs vs. containers: Which is better for security?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019
|
|
|
MicroScope – October 2019: What's next for the channel?
sponsored by MicroScope
EZINE:
The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly
Posted: 23 Sep 2019 | Published: 04 Sep 2019
|
|
|
Infographic: 5 ways to achieve a risk-based security strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 16 Aug 2019 | Published: 16 Aug 2019
|
|
|
CW ASEAN: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE:
Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
Posted: 11 Jul 2019 | Published: 18 Jul 2019
|
|
|
A Guide to SIEM Platforms, Benefits and Features
sponsored by TechTarget Security
EZINE:
SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020
|
|
|
Key Features in Building a Security Operations Center
sponsored by Rapid7
EGUIDE:
Whether a SOC is internally staffed or provided externally, building a security operations center means including some key technical capabilities engineered to cover the full lifecycle of a cybersecurity incident. Download this e-guide to learn about the must-have features when building a SOC.
Posted: 09 Jan 2020 | Published: 08 Jan 2020
|
|
|
SIEM Tools, Future Tech and How to Prepare for What's Ahead
sponsored by Sumo Logic AWS
EBOOK:
While security tech is evolving, so are the threats. Current IT staffs are feeling overwhelmed and some experts believe AI is the answer. Gartner, however, claims that AI will never be perfect, and SIEM will always need a human touch. In this e-book, look at current SIEM tools, future tech and how to prepare for what’s ahead.
Posted: 06 Jan 2020 | Published: 06 Jan 2020
|
|
|
Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 16 Dec 2019 | Published: 16 Dec 2019
|
|
|
Assess Secure Web Gateways to Suit Your Network Security Needs
sponsored by TechTarget Security
ESSENTIAL GUIDE:
Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
Posted: 04 Dec 2019 | Published: 04 Dec 2019
|
|
|
Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE:
The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019
|
|
|
Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE:
The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
Posted: 22 Nov 2019 | Published: 21 May 2018
|
|
|
Top 10 IT security stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019
|
|
|
Threat Hunting and Machine Learning
sponsored by Dell SecureWorks
EGUIDE:
In this e-guide, Fidelis president and CEO Nick Lantuh explains why more organizations should embrace the threat hunting process as part of their cybersecurity strategy and shares threat hunting best practices. Lantuh also explains why machine learning has become an important component of the threat hunting process. Read on to learn more.
Posted: 25 Sep 2019 | Published: 25 Sep 2019
|
|
|
Preparing for Personal Data Privacy Policies
sponsored by Micro Focus
EGUIDE:
As data privacy laws continue to be established, the relationship that individuals have with companies has changed. No longer are companies free to just collect data and do whatever they please; they now effectively become stewards of the data. In this e-guide, discover how organizations can better manage personal data.
Posted: 12 Jul 2019 | Published: 10 Jul 2019
|
|
|
Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE:
Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019
|
|
|
Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK:
While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019
|
|
|
A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE:
If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019
|
|
|
Who Needs Security Orchestration, Automation and Response?
sponsored by TechTarget Security
EBOOK:
Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to boost the security of an organization's systems and data.
Posted: 08 May 2019 | Published: 08 May 2019
|
|