Information Security Standards Reports

SME security - a business imperative
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 08 Feb 2021 | Published: 07 Aug 2017

TechTarget ComputerWeekly.com

Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

How to Start Building an Enterprise Application Security Program
sponsored by tCell
EGUIDE: In this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.
Posted: 20 Mar 2017 | Published: 16 Mar 2017

tCell

Computer Weekly – 12 September 2023: The dangers of breaking encryption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
Posted: 11 Sep 2023 | Published: 12 Sep 2023

TechTarget ComputerWeekly.com

MITRE ATT&CK: Climb to the top
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

The Security Risks of IoT
sponsored by Fortinet, Inc.
EGUIDE: In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose.
Posted: 07 Jun 2017 | Published: 31 May 2017

Fortinet, Inc.

Risk Assessment: The Roles Vendors and Frameworks Play
sponsored by BitSight
EGUIDE: Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.
Posted: 23 Feb 2017 | Published: 15 Feb 2017

BitSight

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk