Cyber Security Reports

5 types of data security
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023

TechTarget ComputerWeekly.com

Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly – 3 October 2023: Where next for quantum computing?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the head of Amazon's Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now.
Posted: 02 Oct 2023 | Published: 03 Oct 2023

TechTarget ComputerWeekly.com

Buyer's Guide for Data Protection and Cyber Resiliency Solutions
sponsored by Hitachi Vantara
BUYER'S GUIDE: Growing security risks, combined with complex IT landscapes, have made the job of protecting enterprise data challenging. Read "Buyer's Guide for Data Protection and Cyber Resiliency Solutions" to discover the right combination of tools to achieve reliable backups, faster recovery and enhanced cyber protection.
Posted: 23 Apr 2024 | Published: 23 Apr 2024

TOPICS:  Cybersecurity
Hitachi Vantara

Proactive Cybersecurity: 6 Critical Tasks to Mitigate Risk
sponsored by Google
WHITE PAPER: This paper details 6 key cybersecurity tactics to reduce risk. It offers advice on comprehending attack surfaces, fortifying endpoints, limiting external protocols, enforcing robust MFA, boosting monitoring, and refining incident response. For an in-depth look at these proactive measures, read it now.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

TOPICS:  Cybersecurity
Google

Traditional vs. enterprise risk management: How do they differ?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.
Posted: 29 Jun 2023 | Published: 29 Jun 2023

TechTarget ComputerWeekly.com

Computer Weekly - 23 August 2022: How digital technology rescued Merlin
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Merlin Entertainments – operator of Legoland and Alton Towers – about how digital saved the company when Covid shut its theme parks. We find out how data analytics can help to track greenhouse gas emissions. And Southern Water explains how data supports vulnerable customers. Read the issue now.
Posted: 19 Aug 2022 | Published: 23 Aug 2022

TechTarget ComputerWeekly.com

MicroScope – May-June 2024: The challenge of our time
sponsored by MicroScope
EZINE: In this issue, explore what you can do to help customers on their net-zero journeys as sustainability grows in importance in the boardroom. Also read up on the benefits of refurbished kit, and learn how Tech Channel Ambassadors are promoting careers to young people and reskillers
Posted: 02 May 2024 | Published: 03 May 2024

MicroScope