System Security Reports

3 Key Identity Management Tips to Streamline Workflows
sponsored by Beta Systems
EGUIDE: Learn how implementing automation, emergency workflows and audits can help identity management get done securely, safely and efficiently.
Posted: 04 Nov 2021 | Published: 03 Nov 2020

Beta Systems

The Secrets of Evaluating Security Products
sponsored by SentinelOne
EBOOK: Prioritizing security and choosing the right tools is critical for business to maintain their IT environments. This e-book goes in-depth into the trends and challenges of cybersecurity, as well as criteria for evaluating security tools. Read on to learn more.
Posted: 13 Apr 2021 | Published: 31 Aug 2019

SentinelOne

Security Think Tank: Critical National Infrastructure
sponsored by ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

ComputerWeekly.com

Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms
sponsored by Schneider Electric
WHITE PAPER: Enter this whitepaper to learn about the security aspects that go into developing and operating digital, cloud-based remote monitoring platforms built to keep data private and infrastructure systems secure from attackers.
Posted: 18 Nov 2021 | Published: 01 Aug 2016

Schneider Electric

Security Think Tank Christmas Special - The most important lessons of 2021
sponsored by ComputerWeekly.com
EBOOK: In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
Posted: 11 Jan 2022 | Published: 10 Jan 2022

ComputerWeekly.com

How to Effectively Close the SecOps Gap
sponsored by BMC
EGUIDE: Managing the balance between security and system performance is challenging due to their different priorities. Take a short survey to access our free whitepaper now on filling the SecOps gap to create effective collaboration between systems.
Posted: 18 Mar 2022 | Published: 18 Mar 2022

TOPICS:  Security
BMC

2021 Gartner Magic Quadrant for SIEM
sponsored by IBM
EBOOK: PH
Posted: 02 Dec 2021 | Published: 12 Nov 2021

TOPICS:  Security
IBM

Deep learning for countering energy theft – a hybrid long-short term memory approach
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
Posted: 26 Apr 2022 | Published: 26 Apr 2022

ComputerWeekly.com

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 04 Nov 2021 | Published: 05 Nov 2020

Beta Systems

CW Europe - December 2021-February 2022: Norway embraces internet of things
sponsored by ComputerWeekly.com
EZINE: Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.
Posted: 23 Nov 2021 | Published: 09 Dec 2021

ComputerWeekly.com