Cyber Security Reports

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

Computer Weekly – 4 October 2022: Putting APIs to work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
Posted: 30 Sep 2022 | Published: 04 Oct 2022

TechTarget ComputerWeekly.com

4 steps to building a cybersecurity strategy
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: A cybersecurity strategy isn't meant to be perfect, but it must be proactive, effective, actively supported and evolving. Here are the four steps required to get there.
Posted: 19 Jun 2023 | Published: 19 Jun 2023

TOPICS:  Cybersecurity
TechTarget ComputerWeekly.com

CW APAC – Trend Watch: CIO trends
sponsored by TechTarget ComputerWeekly.com
EZINE: Organisations have plenty of technologies to keep track of when digitising their operations. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at IT predictions for 2024, how India's space missions will propel tech and Australia's advances in cyber security.
Posted: 14 Feb 2024 | Published: 14 Feb 2024

TechTarget ComputerWeekly.com

What is Incident Response? Plans, Teams and Tools
sponsored by AT&T Corp
EGUIDE: Many experts use the terms incident response and incident management interchangeably, but the two are hardly the same. So, what is incident response? And what are the essential elements you need to know for protecting your organization? Read this e-guide to find out.
Posted: 18 Sep 2023 | Published: 29 Feb 2024

TOPICS:  Cybersecurity
AT&T Corp

Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
Posted: 30 May 2022 | Published: 31 May 2022

TechTarget ComputerWeekly.com

Zero Trust Impact Report
sponsored by Illumio
EGUIDE: In this eGuide, you will hear that many organizations have begun to implement Zero Trust architectures to modernize their cybersecurity programs and attempt to limit the impact of attacks. Take this survey and gain insight into how organizations are faring with their Zero Trust initiatives.
Posted: 26 Sep 2022 | Published: 26 Sep 2022

TOPICS:  Cybersecurity
Illumio

The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.
Posted: 27 Mar 2023 | Published: 28 Mar 2023

TechTarget ComputerWeekly.com

Why Companies Need Cybersecurity and Cyber Resilience
sponsored by Koris365
EGUIDE: Read the following custom TechTarget e-guide on Why Companies Need Cybersecurity and Cyber Resilience to demystify the definition of cybersecurity and learn how to align it with cyber resilience in your organization.
Posted: 25 Jul 2022 | Published: 22 Jul 2022

TOPICS:  Cybersecurity
Koris365