Cyber Security Reports

Five Cybersecurity Tips for Every Type of Enterprise
sponsored by Hughes Network Systems
SURVEY REWARD: ph
Posted: 20 Apr 2023 | Published: 20 Apr 2023

TOPICS:  Cybersecurity
Hughes Network Systems

Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.
Posted: 15 Aug 2022 | Published: 16 Aug 2022

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

AI in Fraud Management: Uses cases, benefits and challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
Posted: 01 Mar 2023 | Published: 08 Mar 2023

TechTarget ComputerWeekly.com

4 ChatGPT cybersecurity benefits for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As the technology matures and improves, expect to see the following beneficial ChatGPT cybersecurity use cases emerge in the enterprise.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TechTarget ComputerWeekly.com

4 steps to building a cybersecurity strategy
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: A cybersecurity strategy isn't meant to be perfect, but it must be proactive, effective, actively supported and evolving. Here are the four steps required to get there.
Posted: 19 Jun 2023 | Published: 19 Jun 2023

TOPICS:  Cybersecurity
TechTarget ComputerWeekly.com

2023 IT Priorities APAC Report
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.
Posted: 14 Apr 2023 | Published: 14 Apr 2023

TechTarget ComputerWeekly.com

Computer Weekly – 1 August 2023: We're doing AI all wrong
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, AI is being imposed on society from the top down and the socio-economic implications will cause problems – we talk to an expert who says there is a better way. We also find out how hackers – the good kind – are turning to AI to make their work more effective. Read the issue now.
Posted: 31 Jul 2023 | Published: 01 Aug 2023

TechTarget ComputerWeekly.com

CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023

TechTarget ComputerWeekly.com

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com