Network Perimeter Security Reports

CIO Trends India
sponsored by TechTarget ComputerWeekly.com
EGUIDE: CIOs in India have been put to the test as their organisations implement remote work arrangements amid the Covid-19 pandemic. We look at the impact of the coronavirus outbreak on India's IT industry, why a pandemic specific BCP matters and how CIOs can harden up their datacentre equipment supply chains post-Covid-19.
Posted: 08 Feb 2021 | Published: 03 Jun 2020

TechTarget ComputerWeekly.com

How to get started with SASE
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Implementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.
Posted: 28 Sep 2022 | Published: 28 Sep 2022

TechTarget ComputerWeekly.com

Computer Weekly – 14 August 2018: Infrastructure under attack
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Aug 2018

TechTarget ComputerWeekly.com

Top 10 ANZ IT stories of 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE: From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.
Posted: 28 Jan 2022 | Published: 28 Jan 2022

TechTarget ComputerWeekly.com

5 cybersecurity myths and how to address them
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Top APAC telecoms predictions for 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The 5G bandwagon is the talk of town, but 4G will remain the priority for much of Asia-Pacific, among other key trends that will shape telecoms markets across the region.
Posted: 08 Feb 2021 | Published: 16 Jan 2020

TechTarget ComputerWeekly.com

5G: APAC guide to next-gen mobile connectivity
sponsored by TechTarget ComputerWeekly.com
EGUIDE: From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.
Posted: 08 Feb 2021 | Published: 20 Apr 2020

TechTarget ComputerWeekly.com

Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017

TechTarget ComputerWeekly.com

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

Can a zero-trust approach fill the security perimeter void?
sponsored by TechTarget Security
EBOOK: Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

TechTarget Security