Security News White Papers

Infographic: 2019 Europe IT Priorities - Datacentre

Security News White Papers - Tue, 04/30/2019 - 12:00am
In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr. Published by: ComputerWeekly.com

Infographic: 2019 Europe IT Priorities - Security

Security News White Papers - Tue, 04/30/2019 - 12:00am
In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr. Published by: ComputerWeekly.com

How long does it take to get owned?

Security News White Papers - Tue, 04/30/2019 - 12:00am
A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker. Published by: ComputerWeekly.com

Rethinking the Cyber Security of Consumer Internet of Things

Security News White Papers - Thu, 04/25/2019 - 12:00am
The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions. Published by: ComputerWeekly.com

Who needs security orchestration, automation and response?

Security News White Papers - 2 hours 43 min ago
Who needs tools for security orchestration, automation and response? Only organizations that that are short-staffed and overworked. In other words: nearly everyone. Learn how SOAR tools ease the burden of rote but required security tasks and free up security pros for more challenging IT security projects. Published by: SearchSecurity.com

The exploitation of flaws in the HTTPS protocol - 20 years of Bleichenbacher's attack

Security News White Papers - Tue, 04/23/2019 - 12:00am
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented. Published by: ComputerWeekly.com

Handbook: Choosing a Converged Data Protection Solution

Security News White Papers - Wed, 04/17/2019 - 12:00am
This guidebook offers expert advice on evaluating converged data protection solutions, with consideration given to the value and risk of integrating data protection and management and what vendors have to offer. For assistance with assessing your company's options, read the guidebook here. Published by: SearchDataBackup.com

Time to get prepared for IoT security issues

Security News White Papers - Wed, 04/17/2019 - 12:00am
Talking about the internet of things means addressing IoT security issues. By 2025, experts predict there will be more than 75 billion IoT devices globally, which means every organization should pay attention to IoT security when it comes to its systems and data. Published by: IoTAgenda

Computer Weekly – 9 April 2019: Using data science at Sainsbury's

Security News White Papers - Fri, 04/12/2019 - 12:00am
In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now. Published by: ComputerWeekly.com

CW Middle East ezine April 11 2019

Security News White Papers - Fri, 04/12/2019 - 12:00am
It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings. Published by: ComputerWeekly.com

A Computer Weekly buyer's guide to Threat Management

Security News White Papers - Fri, 04/12/2019 - 12:00am
Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs. Published by: ComputerWeekly.com

Expert Guide to DNS, SME Security, and Zero-Day Attacks

Security News White Papers - Wed, 04/10/2019 - 12:00am
Get up to speed fast on means and methods for reducing or eliminating security-related issues in DNS, an integral service upon which the internet depends. Published by: Avast Software

The best email security comes through strategy and tactics

Security News White Papers - Fri, 04/05/2019 - 12:00am
Achieving the best email security possible should be a top infosec priority. Learn how to approach email security both strategically and tactically. Published by: SearchSecurity.com

April ezine: SD-WAN more than just networking

Security News White Papers - Thu, 04/04/2019 - 12:00am
An issue covering SD-WAN, storage innovations and opportunities for channel growth Published by: MicroScope

Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial

Security News White Papers - Tue, 04/02/2019 - 12:00am
In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now. Published by: ComputerWeekly.com

Facing up to emerging technology: Risks and benefits

Security News White Papers - Fri, 03/29/2019 - 12:00am
Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks. Published by: SearchCIO

Multi-pronged approach to cyber security professional development

Security News White Papers - Thu, 03/28/2019 - 12:00am
In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development. Published by: ComputerWeekly.com