Computer Security Management Reports

The Evolving CIO role: from IT Operator to Business Strategist
sponsored by BMC
EGUIDE: Since its beginnings nearly 40 years ago, the job of an organization's top IT executive has involved the cost-effective and strategic management of IT systems. But today's CIOs must also understand how IT drives business transformation.
Posted: 21 Jul 2022 | Published: 20 Jul 2022

BMC

How to Shrink Supply Chain Risk
sponsored by TechTarget
RESOURCE: The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
Posted: 02 Aug 2021 | Published: 29 May 2021

TechTarget

Computer Weekly - 10-16 September 2019: A tech boost for social care
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
Posted: 08 Feb 2021 | Published: 10 Sep 2019

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cyber insurance
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
Posted: 01 Aug 2022 | Published: 01 Aug 2022

TechTarget ComputerWeekly.com

Can Lady Gaga and Madonna get people to take security seriously
sponsored by TechTarget ComputerWeekly.com
EGUIDE: What does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. Read more in this PDF.
Posted: 08 Feb 2021 | Published: 14 May 2020

TechTarget ComputerWeekly.com

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Infographic: 5 essential open source cybersecurity tools for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
Posted: 17 Feb 2022 | Published: 17 Feb 2022

TechTarget ComputerWeekly.com

Computer Weekly – 13 September 2022: Source responsibly: Tech sector efforts to root out forced labour are failing
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we analyse the technology industry's failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management. Read the issue now.
Posted: 09 Sep 2022 | Published: 13 Sep 2022

TechTarget ComputerWeekly.com

MicroScope – February 2023: Opportunities in security
sponsored by MicroScope
EZINE: In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
Posted: 31 Jan 2023 | Published: 01 Feb 2023

MicroScope

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com