Closed Loop Security Reports

CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance
sponsored by TechTarget ComputerWeekly.com
EZINE: One Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.
Posted: 20 Oct 2021 | Published: 11 Nov 2021

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.
Posted: 19 Jul 2022 | Published: 19 Jul 2022

TechTarget ComputerWeekly.com

CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres
sponsored by TechTarget ComputerWeekly.com
EZINE: Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
Posted: 22 Mar 2022 | Published: 07 Apr 2022

TechTarget ComputerWeekly.com

MicroScope - December 2021: Valuing the MSP
sponsored by MicroScope
EZINE: In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.
Posted: 26 Nov 2021 | Published: 03 Dec 2021

MicroScope

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Deep learning for countering energy theft – a hybrid long-short term memory approach
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
Posted: 26 Apr 2022 | Published: 26 Apr 2022

TechTarget ComputerWeekly.com

Log More to Improve Visibility and Enhance Security
sponsored by CrowdStrike
WHITE PAPER: ph
Posted: 22 Sep 2023 | Published: 22 Sep 2023

TOPICS:  Security
CrowdStrike

CW APAC October 2023 – Buyer’s guide to IAM
sponsored by TechTarget ComputerWeekly.com
EZINE: Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.
Posted: 19 Oct 2023 | Published: 19 Oct 2023

TechTarget ComputerWeekly.com

Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.
Posted: 10 Sep 2021 | Published: 14 Sep 2021

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to secure coding
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.
Posted: 07 Jul 2023 | Published: 07 Jul 2023

TechTarget ComputerWeekly.com