Device Security Policies Reports

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

TechTarget ComputerWeekly.com

European Perceptions, Preparedness and Strategies for IoT Security
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
Posted: 08 Feb 2021 | Published: 12 Jul 2017

TechTarget ComputerWeekly.com

Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
Posted: 22 Mar 2021 | Published: 23 Mar 2021

TechTarget ComputerWeekly.com

Implementing a Zero-Trust Approach to Network Security
sponsored by TechTarget
RESOURCE: Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 04 Oct 2021 | Published: 04 Feb 2020

TechTarget

Computer Weekly - 22 June 2021: A new three-year plan for digital government
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.
Posted: 21 Jun 2021 | Published: 22 Jun 2021

TechTarget ComputerWeekly.com

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Employ AI for Cybersecurity, Reap Strong Defenses Faster
sponsored by TechTarget Security
EBOOK: Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

TechTarget Security

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

How to Improve Your Security Incident Response Process
sponsored by ServiceNow
EGUIDE: Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
Posted: 08 Feb 2021 | Published: 24 Oct 2019

ServiceNow