Management of Security Information Reports

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 08 Feb 2021 | Published: 16 Sep 2020

GoSecure

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com

CW APAC: CIO trends
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead
Posted: 14 Jan 2022 | Published: 14 Jan 2022

TechTarget ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

Top 10 cyber security stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022

TechTarget ComputerWeekly.com

The Evolving CIO role: from IT Operator to Business Strategist
sponsored by BMC
EGUIDE: Since its beginnings nearly 40 years ago, the job of an organization's top IT executive has involved the cost-effective and strategic management of IT systems. But today's CIOs must also understand how IT drives business transformation.
Posted: 21 Jul 2022 | Published: 20 Jul 2022

BMC

Provide Secure Remote Access And Gain Peace Of Mind With Palo Alto Networks Prisma Access
sponsored by Palo Alto Networks
ANALYST REPORT: As more apps, servers & services are delivered from the cloud, organizations are reevaluating whether legacy point solutions can adequately scale & provide secure, reliable access for their users & locations. Security is being stepped up in response. Read this Forrester report to explore the value of Palo Alto Networks Prisma Access.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Palo Alto Networks

Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.
Posted: 13 Jun 2022 | Published: 14 Jun 2022

TechTarget ComputerWeekly.com

Preventing identity theft in a data breach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com