ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • IT/OT convergence is necessary, but not so simple

    Sponsored by: TechTarget ComputerWeekly.com

    This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.

  • CW ANZ, July 2020: Expert Advice on Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

  • Royal Holloway: Driverless vehicle security for military applications

    Sponsored by: TechTarget ComputerWeekly.com

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

  • False cents of security: The price of being compromised

    Sponsored by: TechTarget ComputerWeekly.com

    Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.

  • COVID-19 in APAC:Tech industry lessons & innovations

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.

  • Guide to business continuity planning during COVID-19

    Sponsored by: TechTarget ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • IT Priorities 2020: APAC

    Sponsored by: TechTarget ComputerWeekly.com

    The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • CW APAC - March 2020: Expert Advice: Security Operations Centre

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.

  • Data Analytics in Healthcare: Opportunities & Challenges

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: TechTarget ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • Computer Weekly - 5 November 2019: The benefits of API-first software development

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

  • Infographic: 2019 IT Priorities - Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.

  • IAM: Key to security and business success in the digital era

    Sponsored by: TechTarget ComputerWeekly.com

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

  • Network Security: Spotlight on Australia/New Zealand

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • Focus: how to avoid being hit by ransomware

    Sponsored by: TechTarget ComputerWeekly.com

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: TechTarget ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Object Storage 101

    Sponsored by: TechTarget ComputerWeekly.com

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

  • Are we trusting social networks too much?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.