Network Threats Reports

Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 08 Feb 2021 | Published: 02 Oct 2018

TechTarget ComputerWeekly.com

Computer Weekly – 4 October 2022: Putting APIs to work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
Posted: 30 Sep 2022 | Published: 04 Oct 2022

TechTarget ComputerWeekly.com

Cyber Crisis Communication Planning and Response Services
sponsored by Google
PRODUCT OVERVIEW: Magnifying awareness of an incident and engaging more stakeholders helps adversaries achieve their mission. Try an alternative tactic: Cyber Crisis Communication Services. This product overview explains Mandiant’s services and 3 pillars of an effective incident communications approach.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

Google

MicroScope – February 2021: The forecast on channel security
sponsored by MicroScope
EZINE: MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
Posted: 08 Feb 2021 | Published: 05 Feb 2021

MicroScope

7 risk mitigation strategies to protect business operations
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.
Posted: 13 Oct 2022 | Published: 13 Oct 2022

TechTarget ComputerWeekly.com

MicroScope – October 2019: What's next for the channel?
sponsored by MicroScope
EZINE: The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly
Posted: 08 Feb 2021 | Published: 04 Sep 2019

MicroScope

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

TechTarget ComputerWeekly.com

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 08 Feb 2021 | Published: 16 Aug 2019

TechTarget ComputerWeekly.com