Security Reports

CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off
sponsored by ComputerWeekly.com
EZINE: Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.
Posted: 23 Nov 2022 | Published: 08 Dec 2022

ComputerWeekly.com

CW Nordics - November 2022 - January 2023: Icelandic datacentres point way to greener IT
sponsored by ComputerWeekly.com
EZINE: Iceland may soon become even more attractive to firms wanting to minimise their carbon footprint while using high-performance computing services. Read more about it in this issue. Also find out how a robo investment company, Nord Investments, is harnessing open banking to make thing easier for its clients.
Posted: 16 Nov 2022 | Published: 24 Nov 2022

ComputerWeekly.com

The Essential Guide To Fraud
sponsored by Splunk
WHITE PAPER: Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.
Posted: 02 Nov 2022 | Published: 25 Mar 2019

Splunk

CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital
sponsored by ComputerWeekly.com
EZINE: Heineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.
Posted: 26 Oct 2022 | Published: 10 Nov 2022

ComputerWeekly.com

Optimize Information Management for Improved Information Security, Governance and Compliance
sponsored by Hyland
WHITE PAPER: As data continues to grow both in quantity and value, the risk surrounding it is on the rise. Organizations can no longer afford to leave their information unmanaged and need methods for organizing and securing their data. This white paper provides you with strategies and approaches for better secure information management. Read on to learn more.
Posted: 18 Oct 2022 | Published: 18 Oct 2022

Hyland

How to get started with SASE
sponsored by ComputerWeekly.com
INFOGRAPHIC: Implementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.
Posted: 28 Sep 2022 | Published: 28 Sep 2022

ComputerWeekly.com

CW APAC: Trend Watch: Cloud networking
sponsored by ComputerWeekly.com
EZINE: In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

ComputerWeekly.com

CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT
sponsored by ComputerWeekly.com
EZINE: Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.
Posted: 01 Sep 2022 | Published: 09 Sep 2022

ComputerWeekly.com

7 best practices for Web3 security risk mitigation
sponsored by ComputerWeekly.com
EGUIDE: Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

ComputerWeekly.com

CW Nordics - August-October 2022: Norway struggles to keep up with demand for tech specialists
sponsored by ComputerWeekly.com
EZINE: The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies.
Posted: 04 Aug 2022 | Published: 25 Aug 2022

ComputerWeekly.com

A Computer Weekly buyer's guide to cyber insurance
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
Posted: 01 Aug 2022 | Published: 01 Aug 2022

ComputerWeekly.com

The Business Advantages of SOC as a Service
sponsored by Koris365
EGUIDE: Dismissed by some as a “marketing term”, security operations center as a service (SOCaaS) is gaining traction. Download this custom TechTarget e-guide to closely examine what SOCaaS is, why it’s necessary, its benefits, and 4 recommendations for the purchasing consideration process.
Posted: 25 Jul 2022 | Published: 25 Jul 2022

TOPICS:  Security
Koris365

A Computer Weekly buyer's guide to supply chain security
sponsored by ComputerWeekly.com
EGUIDE: Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.
Posted: 19 Jul 2022 | Published: 19 Jul 2022

ComputerWeekly.com

Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

ComputerWeekly.com

CW Middle East - July-September 2022: UAE citizens embrace new digital technologies
sponsored by ComputerWeekly.com
EZINE: A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.
Posted: 22 Jun 2022 | Published: 07 Jul 2022

ComputerWeekly.com

Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.
Posted: 13 Jun 2022 | Published: 14 Jun 2022

ComputerWeekly.com

Royal Holloway: Corporate under-reporting of cyber crime
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Posted: 26 May 2022 | Published: 26 May 2022

ComputerWeekly.com

Royal Holloway: Attack mapping for the internet of things
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
Posted: 13 May 2022 | Published: 13 May 2022

ComputerWeekly.com

Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
Posted: 09 May 2022 | Published: 10 May 2022

ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

Royal Holloway: Security evaluation of network traffic mirroring in public cloud
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

ComputerWeekly.com

MITRE ATT&CK: Climb to the top
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

ComputerWeekly.com

Deep learning for countering energy theft – a hybrid long-short term memory approach
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
Posted: 26 Apr 2022 | Published: 26 Apr 2022

ComputerWeekly.com

CW Benelux - May-July 2022: Meta shelves hyperscale datacentre plan in Netherlands
sponsored by ComputerWeekly.com
EZINE: Meta's plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament's call for the government to do everything in its power to stop the facility being built. Read about it in this issue of CW Benelux.
Posted: 25 Apr 2022 | Published: 12 May 2022

ComputerWeekly.com

Royal Holloway: Cloud-native honeypot deployment
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
Posted: 22 Apr 2022 | Published: 25 Apr 2022

ComputerWeekly.com