Computer Network Security Reports

Ransomware: The situation at the beggining of 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: 2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.
Posted: 08 Mar 2022 | Published: 08 Mar 2022

TechTarget ComputerWeekly.com

Ofcom raise over £1.3bn in new 5G spectrum auction
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

TechTarget ComputerWeekly.com

2021 IT Priorities: APAC report
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
Posted: 08 Feb 2021 | Published: 10 Dec 2020

TechTarget ComputerWeekly.com

MicroScope – January 2021: Looking forward to the future
sponsored by MicroScope
EZINE: In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success
Posted: 08 Feb 2021 | Published: 08 Jan 2021

MicroScope

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

Trust no one: Why zero trust security is taking the world by storm
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
Posted: 18 Feb 2022 | Published: 18 Feb 2022

TechTarget ComputerWeekly.com

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 May 2018

TechTarget ComputerWeekly.com

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

SASE & Zero Trust: Your Network Security Guide
sponsored by Aruba Networks
EGUIDE: Learn about the top 5 benefits of SASE and how it enables zero-trust network access.
Posted: 26 Aug 2021 | Published: 25 Aug 2021

Aruba Networks