Security Best Practices Research
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
Enable And Protect Your Remote Workforce
Sponsored by: AT&T CybersecurityDownload this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
-
Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
-
GoSecure Cybersecurity Perceptions Versus Reality
Sponsored by: GoSecureThis 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
-
Australia's cybersecurity game plan
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
-
A Computer Weekly buyer's guide to artificial intelligence in IT security
Sponsored by: TechTarget ComputerWeekly.comArtificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
CW ANZ, July 2020: Expert Advice on Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
CW APAC, July 2020: Trend Watch: Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
-
Royal Holloway: Man proposes, fraud disposes
Sponsored by: TechTarget ComputerWeekly.comIn May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Making the case for cloud-based security
Sponsored by: TechTarget ComputerWeekly.comCloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
-
The Relationship Between Security Maturity and Business Enablement
Sponsored by: AT&T CybersecurityAT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.
-
Can Lady Gaga and Madonna get people to take security seriously
Sponsored by: TechTarget ComputerWeekly.comWhat does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. Read more in this PDF.
-
Getting Cloud Security Right
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
-
5 Building blocks for strengthening your IT security program
Sponsored by: AT&T CybersecurityGiven how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.
-
A guide to build vs. buy service models for threat detection and response
Sponsored by: AT&T CybersecurityMany important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
-
RSA Conference 2020 guide: Highlighting security's human element
Sponsored by: TechTarget ComputerWeekly.comThe theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
-
The Advantages of a SaaS-Based Application Security Solution
Sponsored by: Veracode, Inc.In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.
-
Shore up your cybersecurity resilience: A guide for ANZ businesses
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
-
How Do Vulnerabilities Get Into Software?
Sponsored by: Veracode, Inc.Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
-
IT Priorities 2020: APAC
Sponsored by: TechTarget ComputerWeekly.comThe Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.
-
Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.
-
CW APAC - March 2020: Expert Advice: Security Operations Centre
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
-
A Computer Weekly buyer's guide to zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
-
Ponemon - Costs and Consequences of Gaps in Vulnerability Response
Sponsored by: ServiceNowPonemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.