Security Tools Reports

Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

Top 10 cyber security stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022

TechTarget ComputerWeekly.com

Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016

TechTarget ComputerWeekly.com

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 08 Feb 2021 | Published: 12 Sep 2017

TechTarget ComputerWeekly.com

CW Europe - March-May 2020: Experts examine Dutch government's IT problems
sponsored by TechTarget ComputerWeekly.com
EZINE: Technology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.
Posted: 08 Feb 2021 | Published: 12 Mar 2020

TechTarget ComputerWeekly.com

MicroScope – February 2023: Opportunities in security
sponsored by MicroScope
EZINE: In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
Posted: 31 Jan 2023 | Published: 01 Feb 2023

MicroScope

CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023

TechTarget ComputerWeekly.com

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

Risk Management: Best and Worst Practices
sponsored by BitSight
EGUIDE: Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

BitSight

IoT Security Testing: Cover All Your Bases
sponsored by Synopsys
EGUIDE: Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.
Posted: 12 Oct 2016 | Published: 11 Oct 2016

All resources sponsored by Synopsys