WHITE PAPER:
Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
EGUIDE:
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
EZINE:
In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
EGUIDE:
Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
EGUIDE:
In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
EGUIDE:
In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
EGUIDE:
Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
EGUIDE:
In this expert e-guide, uncover an artificial intelligence engine that takes security to a completely different level than ever before. Uncover how to leverage big data technologies to help mitigate the risk of targeted, persistent threats.