Managing Security Reports

Preventing identity theft in a data breach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cyber insurance
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
Posted: 01 Aug 2022 | Published: 01 Aug 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to robotic process automation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Robotic process automation is making its business value known in a variety of ways. In this 15-page buyer's guide, Computer Weekly looks at how how the market is ever-evolving, the security risks to guard against, and how RPA can spearhead a firm's digital transformation
Posted: 08 Feb 2021 | Published: 05 Nov 2019

TechTarget ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

TechTarget ComputerWeekly.com

Data protection, a live issue that affects us all
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.
Posted: 08 Feb 2021 | Published: 16 Dec 2019

TechTarget ComputerWeekly.com

Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to zero-trust security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
Posted: 08 Feb 2021 | Published: 09 Mar 2020

TechTarget ComputerWeekly.com

Computer Weekly - 10-16 September 2019: A tech boost for social care
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
Posted: 08 Feb 2021 | Published: 10 Sep 2019

TechTarget ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com