EGUIDE:
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
ESSENTIAL GUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
EZINE:
We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
ESSENTIAL GUIDE:
Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
EGUIDE:
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
EGUIDE:
SD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.
EGUIDE:
Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
EGUIDE:
In this expert guide, George Crump outlines the state of flash storage systems, and demonstrates how to use NVMe and flash DIMM to proactively keep performance ahead of users' expectations. Read on as Crump also predicts the fate of HDDs, and explains how to keep pace by improving internal and external connectivity.