Network Perimeter Security Reports

Infographic: Top 12 risk management skills
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.
Posted: 01 Nov 2021 | Published: 25 Oct 2021

TechTarget ComputerWeekly.com

5G: APAC guide to next-gen mobile connectivity
sponsored by TechTarget ComputerWeekly.com
EGUIDE: From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.
Posted: 08 Feb 2021 | Published: 20 Apr 2020

TechTarget ComputerWeekly.com

Computer Weekly – 14 August 2018: Infrastructure under attack
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Aug 2018

TechTarget ComputerWeekly.com

Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.
Posted: 15 Sep 2023 | Published: 19 Sep 2023

TechTarget ComputerWeekly.com

IT/OT convergence is necessary, but not so simple
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
Posted: 08 Feb 2021 | Published: 14 Aug 2020

TechTarget ComputerWeekly.com

5 common SD-WAN challenges
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: SD-WAN is a feature-rich technology with the ability to consolidate networking, security, reporting and management into one platform. But potential users should be aware of inherent SD-WAN challenges and deployment risk factors. In this infographic, we point out five challenges IT teams are facing when evaluating SD-WAN technologies and vendors.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

Computer Weekly – 16 October 2018: Drilling into AI at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Oct 2018

TechTarget ComputerWeekly.com

CW APAC, April 2022: Trend Watch: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access
Posted: 14 Apr 2022 | Published: 14 Apr 2022

TechTarget ComputerWeekly.com

Can a SASE architecture deliver better network performance?
sponsored by TechTarget Networking
EGUIDE: Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

TechTarget Networking