Managing Security Reports

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Dutch organisations demand more from government
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
Posted: 08 Feb 2021 | Published: 09 Dec 2019

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com

Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.
Posted: 13 Jun 2022 | Published: 14 Jun 2022

TechTarget ComputerWeekly.com

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

TechTarget ComputerWeekly.com

Royal Holloway: Man proposes, fraud disposes
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

Provide Secure Remote Access And Gain Peace Of Mind With Palo Alto Networks Prisma Access
sponsored by Palo Alto Networks
ANALYST REPORT: As more apps, servers & services are delivered from the cloud, organizations are reevaluating whether legacy point solutions can adequately scale & provide secure, reliable access for their users & locations. Security is being stepped up in response. Read this Forrester report to explore the value of Palo Alto Networks Prisma Access.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Palo Alto Networks

Getting Cloud Security Right
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
Posted: 08 Feb 2021 | Published: 11 May 2020

TechTarget ComputerWeekly.com

How Can Healthcare Protect Against Zero-Day Attacks and What Does It Mean?
sponsored by XtelligentMedia Healthcare
EGUIDE: Zero-day attacks pose significant dangers to the healthcare sector, but defenders can mitigate risk by patching early and often.
Posted: 08 Apr 2024 | Published: 08 Apr 2024

XtelligentMedia Healthcare

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com