Security Administration Reports

A Computer Weekly buyer's guide to SIEM and SOAR
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
Posted: 09 Sep 2021 | Published: 09 Sep 2021

TechTarget ComputerWeekly.com

Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 08 Feb 2021 | Published: 21 Oct 2019

TechTarget ComputerWeekly.com

Trust no one: Why zero trust security is taking the world by storm
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
Posted: 18 Feb 2022 | Published: 18 Feb 2022

TechTarget ComputerWeekly.com

Servicenow Finds The Smarter Way To Segment Using Illumio
sponsored by Illumio
CASE STUDY: ServiceNow is a premier cloud platform for IT service management. When they identified the need to address a flat network and properly secure their domain controllers and core services, they knew it was time to refine their network segmentation strategy. Leverage this case study to see how Illumio’s Secure Cloud platform delivered value.
Posted: 28 Dec 2021 | Published: 05 Mar 2021

Illumio

Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 08 Feb 2021 | Published: 15 Jul 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cyber insurance
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
Posted: 01 Aug 2022 | Published: 01 Aug 2022

TechTarget ComputerWeekly.com

Top 10 cyber crime stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

Getting Cloud Security Right
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
Posted: 08 Feb 2021 | Published: 11 May 2020

TechTarget ComputerWeekly.com

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

TechTarget ComputerWeekly.com