Computer Security Reports

Centralized vs. decentralized identity management explained
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TechTarget ComputerWeekly.com

CW Middle East - July-September 2022: UAE citizens embrace new digital technologies
sponsored by TechTarget ComputerWeekly.com
EZINE: A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.
Posted: 22 Jun 2022 | Published: 07 Jul 2022

TechTarget ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

CW APAC: Trend Watch: Cloud networking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TechTarget ComputerWeekly.com

Computer Weekly - 22 June 2021: A new three-year plan for digital government
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.
Posted: 21 Jun 2021 | Published: 22 Jun 2021

TechTarget ComputerWeekly.com

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Preventing identity theft in a data breach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

CW EMEA - May 2023: The future of work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
Posted: 10 May 2023 | Published: 11 May 2023

TechTarget ComputerWeekly.com

The Business Advantages of SOC as a Service
sponsored by Koris365
EGUIDE: Dismissed by some as a “marketing term”, security operations center as a service (SOCaaS) is gaining traction. Download this custom TechTarget e-guide to closely examine what SOCaaS is, why it’s necessary, its benefits, and 4 recommendations for the purchasing consideration process.
Posted: 25 Jul 2022 | Published: 25 Jul 2022

TOPICS:  Security
Koris365