Closed Loop Security Reports

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

TechTarget ComputerWeekly.com

Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
Posted: 09 May 2022 | Published: 10 May 2022

TechTarget ComputerWeekly.com

Password Security Guidelines
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019

TechTarget

Royal Holloway: Attack mapping for the internet of things
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
Posted: 13 May 2022 | Published: 13 May 2022

TechTarget ComputerWeekly.com

CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT
sponsored by TechTarget ComputerWeekly.com
EZINE: Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.
Posted: 01 Sep 2022 | Published: 09 Sep 2022

TechTarget ComputerWeekly.com

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

How Russia's war in Ukraine is changing the cybersecurity game and why that matters
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Servicenow Finds The Smarter Way To Segment Using Illumio
sponsored by Illumio
CASE STUDY: ServiceNow is a premier cloud platform for IT service management. When they identified the need to address a flat network and properly secure their domain controllers and core services, they knew it was time to refine their network segmentation strategy. Leverage this case study to see how Illumio’s Secure Cloud platform delivered value.
Posted: 28 Dec 2021 | Published: 05 Mar 2021

Illumio

Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
Posted: 06 Sep 2021 | Published: 07 Sep 2021

TechTarget ComputerWeekly.com

Computer Weekly – 7 February 2023: Making IT security training stick
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our buyer's guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors. Read the issue now.
Posted: 03 Feb 2023 | Published: 07 Feb 2023

TechTarget ComputerWeekly.com