Security Protocols Reports

Trouble at your door: targeted cyber attacks in the UK and Europe
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 08 Feb 2021 | Published: 29 Sep 2016

TechTarget ComputerWeekly.com

Computer Weekly – 30 May 2023: Can the UK cash in on chips?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
Posted: 26 May 2023 | Published: 30 May 2023

TechTarget ComputerWeekly.com

IT Priorities 2020: After Covid-19, security goes back to basics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 08 Feb 2021 | Published: 16 Nov 2020

TechTarget ComputerWeekly.com

Top 10 IT security stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 08 Feb 2021 | Published: 09 Jan 2019

TechTarget ComputerWeekly.com

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

All resources sponsored by BAE Systems Applied Intelligence

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

Top 10 IT security stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

TechTarget ComputerWeekly.com