Cloud Security Research
-
Cloud security risks and the countermeasures you need now
Sponsored by: InteractiveAre you up on cloud security risks and the countermeasures available to you? Cloud risk statistics and other research make clear that security teams must stay alert and continually update their mitigation tactics. This guide shows where cloud threats come from and how best to counteract them.
-
How to Keep Each Cloud Workload Accessible and Secure
Sponsored by: InteractiveWhile the shared responsibility model of cloud security is still relevant, responsibility for keeping cloud workloads safe is increasingly falling more on the shoulders of the in-house security team and management. Download this handbook for everything you need to know about keeping your cloud workloads accessible and secure.
-
CW Nordics - November 2019: Robots help social workers in Sweden
Sponsored by: TechTarget ComputerWeekly.comSoftware robots are being used by more than 20 local authorities in Sweden to carry out repetitive tasks previously done manually, such as document and data checks, freeing up social workers to make life-changing decisions for the needy.
-
Cloud Security that Strikes the Perfect Chord
Sponsored by: AWS Palo Alto NetworksIt can be hard to synchronize your security instruments to detect threats and automatically respond to attacks. Security services from AWS paired with products from Palo Alto Networks can help you harmonize your cloud environments, accounts, and pipelines to keep them working together for comprehensive security.
-
Computer Weekly - 7 April 2020: Adapting IT to the new normal
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
-
9 essential elements of network security
Sponsored by: TechTarget ComputerWeekly.comNetwork security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
-
How to implement a strong COVID-19 cybersecurity plan
Sponsored by: TechTarget SecurityCybercriminals aren't slowing down during the pandemic, and neither can your security. Learn about the biggest threats right now and how to stop them cold.
-
VMs vs. containers: Which is better for security?
Sponsored by: TechTarget ComputerWeekly.comPractitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
-
Securing Your Whenever, Wherever Workforce
Sponsored by: ForcepointHow do we secure what the company doesn't control or even own? How can we protect against intentional and unintentional data leakage from users accessing cloud applications from a variety of devices, including their own personal ones?
-
All Clouds Are Not Equal
Sponsored by: ForcepointAs everyone turns to the cloud for everything, security is no exception. It's no wonder more and more companies and government agencies are employing cloud-based security solutions to gain many advantages.
-
Cyber attackers exploiting poor cloud security
Sponsored by: TechTarget ComputerWeekly.comMore than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
-
What Is Software-Defined Storage and How You Can Benefit from It?
Sponsored by: OVHAs infrastructure elements are now abstracted from their hardware layers and controlled by software, highly resilient, shared datastores can help you grow as go. Download this white paper to learn the 5 benefits of adopting software-defined storage (SDS) and how an SDS approach can fulfill your growing datastorage needs.
-
Navigating VMware and Cloud Backups
Sponsored by: ClumioVMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
-
Buyer's guide to multicloud
Sponsored by: TechTarget ComputerWeekly.comEnterprise's shift towards multicloud is ever-increasing. Computer Weekly looks at the importance of software-defined wide area networks in successful migration, the complications that come with juggling clouds and Microsoft's journey into multicloud support.
-
How to Prepare Your IT Staff for a Transition to the Cloud
Sponsored by: IntelEducating and addressing IT staff roles as they fit into the new cloud infrastructure are essential to achieving operational efficiency within your new cloud environment. Download this guy for 3 essential topics to address with employees before migrating to the cloud.
-
7 Key Characteristics of Cloud Computing
Sponsored by: IntelDownload your copy of this cloud e-guide that outlines the 7 key characteristics to cloud computing for better operational efficiency as the use-cases for cloud grow more complex.
-
A Computer Weekly buyer’s guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Cloud Migration: How to do so safely and securely
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.
-
Key Terms for Cloud Disaster Recovery
Sponsored by: DruvaWe've pulled together 9 must-know cloud DR terms in the following e-guide to help you re-orient yourself in the ever-growing sea of terminology. Download the guide to see for yourself which terms should be top of mind as you pursue a cloud DR strategy.
-
Top 20 Cloud Backup Services for 2019
Sponsored by: DruvaTo keep your pulse on the latest cloud backup developments, download this e-guide. Inside, our experts share 7 considerations for selecting a cloud backup service, examine 20 top cloud backup services to simplify the selection process, and explain how the public cloud is improving data protection.
-
New NVMe Western Digital SSDs Target Cloud, Hyperscale, and the Edge
Sponsored by: Western DigitalView the following expert guide to examine the benefits of running read-intensive workloads in public and private clouds, hyperscale data centers, and edge computing deployments on NVMe.
-
Experts Address Your Cloud Security and Data Protection Concerns
Sponsored by: IBMIn this essential guide, our experts address your cloud backup security concerns and explain what you're required to protect vs. the cloud provider's responsibilities and 3 ways to use the cloud as a data protection target. Download now or risk missing out on the essentials you can put into practice at your company.
-
Multi-cloud Management: 6 Must-have Features and Cost Considerations
Sponsored by: Cisco Systems, Inc.Managing multi-cloud environments can be daunting, especially as applications grow more complex, users become more distributed, and compliance standards become stricter. So, how you maximize each cloud platform's capabilities while also minimizing costs? Read this TechTarget-produced expert guide to find out.
-
Data Protection, Backup and Replication in the Age of the Cloud
Sponsored by: VelosioThis expert guide examines the data protection conundrum in the age of the cloud, with special attention given to meeting SLAs, the benefits and downsides of public cloud backup, and ransomware and security.
-
Incident response playbook in flux as services, tools arrive
Sponsored by: TechTarget SecurityThe enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.