Computer Network Security Reports

Infographic: 5 essential open source cybersecurity tools for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
Posted: 17 Feb 2022 | Published: 17 Feb 2022

TechTarget ComputerWeekly.com

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

Top 10 ASEAN IT stories of 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE: From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.
Posted: 28 Jan 2022 | Published: 28 Jan 2022

TechTarget ComputerWeekly.com

Best practices for container security in the data center
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Containers present unique security challenges and data centers must learn and adapt to those challenges. Although containers might present certain unfamiliar security risks, data center admins who work with them can learn several effective ways to keep their container environments safe.
Posted: 29 Sep 2022 | Published: 29 Sep 2022

TechTarget ComputerWeekly.com

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

5G: APAC guide to next-gen mobile connectivity
sponsored by TechTarget ComputerWeekly.com
EGUIDE: From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.
Posted: 08 Feb 2021 | Published: 20 Apr 2020

TechTarget ComputerWeekly.com

Computer Weekly – 8 January 2019: Technology innovation in music
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2019

TechTarget ComputerWeekly.com

Top APAC security predictions for 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
Posted: 08 Feb 2021 | Published: 16 Jan 2020

TechTarget ComputerWeekly.com

A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

TechTarget ComputerWeekly.com

Top 10 networking stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: New hybrid workplace environments are demanding connectivity and security technologies to keep employees productive and able to collaborate. How leaders in the world of networking have been attempting to address these new dynamics over the course of the past year? Look back over Computer Weekly's top 10 networking stories of 2021.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com