Security News White Papers

Government insists 'nothing sinister' about web user data gathering

Security News White Papers - Tue, 10/29/2019 - 12:00am
Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens. Published by: ComputerWeekly.com

Application security: best practices and risks

Security News White Papers - Mon, 10/28/2019 - 12:00am
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips. Published by: ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology

Security News White Papers - 2 hours 14 min ago
Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals. Published by: ComputerWeekly.com

Computer Weekly – 15 October 2019: Securing the internet of things

Security News White Papers - Tue, 10/22/2019 - 12:00am
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now. Published by: ComputerWeekly.com

CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs

Security News White Papers - Thu, 10/17/2019 - 12:00am
Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines. Published by: ComputerWeekly.com

Computer Weekly – 8 October 2019: Showcasing the potential of 5G

Security News White Papers - Tue, 10/15/2019 - 12:00am
In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now. Published by: ComputerWeekly.com

How to solve DNS security issues in your organization

Security News White Papers - Thu, 10/10/2019 - 12:00am
The urgency to implement DDoS protection has never been higher. Without better protection, brand damage, revenue loss and hefty fines can occur. In fact, according to Neustar's Q1 2019 Threats & Trends Report, there has been a 200% increase in the number of DDoS attacks comparing Q1, 2019 to Q1, 2018. Luckily, a secure DNS can Published by: TechTarget

How to Prevent Print-Related Data Breaches

Security News White Papers - Thu, 10/10/2019 - 12:00am
60% of businesses in the UK, US, France, and Germany suffered a print-related data breach in the last year, according to the Global Printer Security Report. Find out how to protect your printers in our expert guide. To access this guide, participate in our Endpoint Security survey. Published by: TechTarget

SOCs: Everything You Need to Know

Security News White Papers - Thu, 10/10/2019 - 12:00am
How do you know if an SOC is right for your organization? Provide your insight in our Market Research Program today, and upon completion, receive a complimentary copy of our expert guide to help you understand the features you should look for in an SOC. Published by: TechTarget

Complete Guide to Ransomware Attack Prevention

Security News White Papers - Thu, 10/10/2019 - 12:00am
If you think ransomware couldn't get any sneakier, think again: it's now capable of infiltrating an organization's backups, meaning contaminated files used to restore data will only perpetuate the attack cycle. Check out our newest resource, Complete Guide to Ransomware Attack Prevention, for tactical guidance on protecting backups Published by: TechTarget

VMs vs. containers: Which is better for security?

Security News White Papers - Wed, 10/09/2019 - 12:00am
Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide. Published by: ComputerWeekly.com

Computer Weekly – 1 October 2019: The most influential women in UK technology

Security News White Papers - Tue, 10/08/2019 - 12:00am
In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now. Published by: ComputerWeekly.com

Computer Weekly – 24 September 2019: Climate change – the challenge for datacentres

Security News White Papers - Tue, 10/01/2019 - 12:00am
In this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now. Published by: ComputerWeekly.com