Active Security Solutions Reports

MicroScope – January 2022: Squaring up to ransomware
sponsored by MicroScope
EZINE: In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead
Posted: 06 Jan 2022 | Published: 07 Jan 2022

MicroScope

CW APAC: CIO trends
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead
Posted: 14 Jan 2022 | Published: 14 Jan 2022

TechTarget ComputerWeekly.com

CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT
sponsored by TechTarget ComputerWeekly.com
EZINE: Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.
Posted: 01 Sep 2022 | Published: 09 Sep 2022

TechTarget ComputerWeekly.com

CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres
sponsored by TechTarget ComputerWeekly.com
EZINE: Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
Posted: 22 Mar 2022 | Published: 07 Apr 2022

TechTarget ComputerWeekly.com

Royal Holloway: Security evaluation of network traffic mirroring in public cloud
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
Posted: 09 May 2022 | Published: 10 May 2022

TechTarget ComputerWeekly.com

CW EMEA - May 2023: The future of work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
Posted: 10 May 2023 | Published: 11 May 2023

TechTarget ComputerWeekly.com

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

TechTarget ComputerWeekly.com

MITRE ATT&CK: Climb to the top
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com

Preventing identity theft in a data breach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com