Closed Loop Security Reports

From The Node Up: The Complete Guide To Kubernetes Security
sponsored by Palo Alto Networks
EBOOK: Download this e-book to learn how to design a security strategy that reinforces, rather than hinders, the rest of your Kubernetes-based processes.
Posted: 15 Nov 2021 | Published: 25 Mar 2021

TOPICS:  Security
Palo Alto Networks

MicroScope – October 2021: Choosing a channel career
sponsored by MicroScope
EZINE: In this issue, we explore whether more partners equals better business, and take a closer look at how IT consumption is changing thanks to subscription services. Also read a special feature looking into whether the channel offers good prospects for school-leavers hoping to start on a career path that could make a difference
Posted: 01 Oct 2021 | Published: 01 Oct 2021

MicroScope

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com

Royal Holloway: Secure multiparty computation and its application to digital asset custody
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
Posted: 20 Apr 2022 | Published: 20 Apr 2022

TechTarget ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

CW EMEA - November 2023: Let the data flow
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA ezine, we find out about Heineken's mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform. Read the issue now.
Posted: 06 Nov 2023 | Published: 09 Nov 2023

TechTarget ComputerWeekly.com

Computer Weekly – 7 February 2023: Making IT security training stick
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our buyer's guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors. Read the issue now.
Posted: 03 Feb 2023 | Published: 07 Feb 2023

TechTarget ComputerWeekly.com

Cyber-Resilient Infrastructure Starts with Server Security
sponsored by Dell Technologies & AMD
WHITE PAPER: In this White Paper, discover how Dell's PowerEdge servers combined with AMD's EPYC line or processors can keep your datacenter secure.
Posted: 16 May 2023 | Published: 16 May 2023

TOPICS:  Security
Dell Technologies & AMD

IT Priorites 2020 - After Covid 19 security goes back to basics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com