EZINE:
In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
EZINE:
In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
EGUIDE:
This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
EZINE:
In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
EGUIDE:
As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.
RESEARCH CONTENT:
This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
EBOOK:
Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.
EGUIDE:
In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.
WHITE PAPER:
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
RESEARCH CONTENT:
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.