Security News White Papers

Infographic: How blockchain works

Security News White Papers - Tue, 09/24/2019 - 12:00am
To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery. Published by:

Computer Weekly - 10-16 September 2019: A tech boost for social care

Security News White Papers - Tue, 09/17/2019 - 12:00am
In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors. Published by:

How to solve DNS security issues in your organization

Security News White Papers - Fri, 09/13/2019 - 12:00am
The urgency to implement DDoS protection has never been higher. Without better protection, brand damage, revenue loss and hefty fines can occur. In fact, according to Neustar's Q1 2019 Threats & Trends Report, there has been a 200% increase in the number of DDoS attacks comparing Q1, 2019 to Q1, 2018. Luckily, a secure DNS can Published by: TechTarget

Key Steps to Put Your Zero-Trust Security Plan Into Action

Security News White Papers - Fri, 09/13/2019 - 12:00am
The traditional network perimeter is disappearing, that's why many turn to zero trust. Participate in our multiple-choice survey for a free PDF of our guide Implementing a Zero-Trust Approach to Network Security. Published by: TechTarget

How to Protect Your Mobile Devices from Cyberattacks

Security News White Papers - Fri, 09/13/2019 - 12:00am
1 in 3 organizations suffered data breaches due to mobile devices, according to a new study by Verizon. This was a 5% increase compared to the results of a similar survey last year. Learn how to secure your organization's mobile devices in our expert e-book which is available after completing our Endpoint Security Research Survey. Published by: TechTarget

Computer Weekly – 3 September 2019: From IT disaster to digital innovation at RBS

Security News White Papers - Tue, 09/10/2019 - 12:00am
In this week's Computer Weekly, we meet the man brought in to turn around the technology at RBS Group after its catastrophic IT outage. We examine the latest best practice in securing mobile devices in the enterprise. And we look at progress towards "passwordless" security. Read the issue now. Published by:

MicroScope – September 2019: Helping digital transformation

Security News White Papers - Fri, 09/06/2019 - 9:00am
The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future Published by: MicroScope

IAM: Managing identity remains key to cyber security

Security News White Papers - Thu, 09/05/2019 - 12:00am
IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly. Published by:

Cyber attackers exploiting poor cloud security

Security News White Papers - Fri, 08/30/2019 - 12:00am
More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene Published by:

CW Nordics August 2019: Copenhagen woos tech startups

Security News White Papers - Thu, 08/29/2019 - 12:00am
Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics. Published by:

Even fintech startups battling to meet cyber security skills

Security News White Papers - Wed, 08/28/2019 - 12:00am
A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge Published by:

A Computer Weekly buyer's guide to data protection

Security News White Papers - Tue, 08/27/2019 - 12:00am
Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture. Published by:

Who will win the world's biggest cloud contract?

Security News White Papers - Tue, 08/27/2019 - 12:00am
In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now. Published by:

Why use Robotic Process Automation?

Security News White Papers - Tue, 08/27/2019 - 12:00am
In this e-guide, read more about the state of RPA adoption in Asia-Pacific, how different RPA players are addressing the needs of the market and what it takes for RPA projects to deliver on the technology's promises. Published by:

Security analytics: Enabling organisations to get ahead of attackers

Security News White Papers - Mon, 08/26/2019 - 12:00am
In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics. Published by:

Infographic: 5 ways to achieve a risk-based security strategy

Security News White Papers - Fri, 08/23/2019 - 12:00am
In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture. Published by: