Cyber Security Reports

What Security Teams Want from MDR Providers
sponsored by Palo Alto Networks
ANALYST REPORT: As managed detection and response (MDR) services become a mainstay in modern security program strategy, it is critical for providers to retain their competitive advantage. Download this ESG e-book to examine industry megatrends impacting MDR selection and discover 3 key factors that are driving initial MDR engagement.
Posted: 11 Oct 2022 | Published: 11 Oct 2022

TOPICS:  Cybersecurity
Palo Alto Networks

MicroScope – March-April 2024: Is cloud the best option?
sponsored by MicroScope
EZINE: In this issue, find out why cloud may not always be the right course of action for businesses to take. Also discover the growing threat artificial intelligence brings to the cyber security market, as well as read predictions on what areas will grow over the course of the year
Posted: 29 Feb 2024 | Published: 01 Mar 2024

MicroScope

CW APAC October 2023 – Buyer’s guide to IAM
sponsored by TechTarget ComputerWeekly.com
EZINE: Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.
Posted: 19 Oct 2023 | Published: 19 Oct 2023

TechTarget ComputerWeekly.com

8 big data use cases for businesses and industry examples
sponsored by TechTarget ComputerWeekly.com
EGUIDE: For businesses, the ability to deal with big data is important: it can bring companies significant business value, from enabling cost optimization and improved efficiency to providing better customer insight. In this article, we'll explore 8 use cases that show big data's profound impact on businesses across different industry sectors.
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
Posted: 18 Nov 2022 | Published: 22 Nov 2022

TechTarget ComputerWeekly.com

Recognizing the Effects of the Healthcare Cyberattack on Providers
sponsored by XtelligentMedia Healthcare
EGUIDE: From major pharmacy chains to independently owned practices, providers across the country are facing significant operational challenges as the Change Healthcare outages continue.
Posted: 02 Apr 2024 | Published: 28 Mar 2024

XtelligentMedia Healthcare

Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.
Posted: 15 Aug 2022 | Published: 16 Aug 2022

TechTarget ComputerWeekly.com

Computer Weekly – 1 August 2023: We're doing AI all wrong
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, AI is being imposed on society from the top down and the socio-economic implications will cause problems – we talk to an expert who says there is a better way. We also find out how hackers – the good kind – are turning to AI to make their work more effective. Read the issue now.
Posted: 31 Jul 2023 | Published: 01 Aug 2023

TechTarget ComputerWeekly.com

4 ChatGPT cybersecurity benefits for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As the technology matures and improves, expect to see the following beneficial ChatGPT cybersecurity use cases emerge in the enterprise.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TechTarget ComputerWeekly.com