Computer Network Security Reports

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly – 8 January 2019: Technology innovation in music
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2019

TechTarget ComputerWeekly.com

SD-WAN: Accelerating network transformation in APAC
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
Posted: 08 Feb 2021 | Published: 01 Sep 2020

TechTarget ComputerWeekly.com

MicroScope – January 2021: Looking forward to the future
sponsored by MicroScope
EZINE: In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success
Posted: 08 Feb 2021 | Published: 08 Jan 2021

MicroScope

Royal Holloway: Security evaluation of network traffic mirroring in public cloud
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com

Top 10 ASEAN IT stories of 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE: From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.
Posted: 28 Jan 2022 | Published: 28 Jan 2022

TechTarget ComputerWeekly.com

Network Security: Spotlight on Australia/New Zealand
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 08 Feb 2021 | Published: 21 Jun 2018

TechTarget ComputerWeekly.com

5 endpoint security best practices
sponsored by TechTarget ComputerWeekly.com
EBOOK: With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.
Posted: 04 Aug 2022 | Published: 04 Aug 2022

TechTarget ComputerWeekly.com

Can a SASE architecture deliver better network performance?
sponsored by TechTarget Networking
EGUIDE: Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

TechTarget Networking