System Security Reports

CW Middle East - July-September 2022: UAE citizens embrace new digital technologies
sponsored by TechTarget ComputerWeekly.com
EZINE: A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.
Posted: 22 Jun 2022 | Published: 07 Jul 2022

TechTarget ComputerWeekly.com

MicroScope – January 2022: Squaring up to ransomware
sponsored by MicroScope
EZINE: In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead
Posted: 06 Jan 2022 | Published: 07 Jan 2022

MicroScope

Security Think Tank Christmas Special - The most important lessons of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
Posted: 11 Jan 2022 | Published: 10 Jan 2022

TechTarget ComputerWeekly.com

MicroScope – February 2023: Opportunities in security
sponsored by MicroScope
EZINE: In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
Posted: 31 Jan 2023 | Published: 01 Feb 2023

MicroScope

Royal Holloway: Security evaluation of network traffic mirroring in public cloud
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com

Shields up! Why Russia's war on Ukraine should matter to security pros
sponsored by TechTarget ComputerWeekly.com
EBOOK: The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.
Posted: 11 Mar 2022 | Published: 11 Mar 2022

TechTarget ComputerWeekly.com

Centralized vs. decentralized identity management explained
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TechTarget ComputerWeekly.com

CW APAC: CIO trends
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead
Posted: 14 Jan 2022 | Published: 14 Jan 2022

TechTarget ComputerWeekly.com

Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.
Posted: 19 Jul 2022 | Published: 19 Jul 2022

TechTarget ComputerWeekly.com