EGUIDE:
This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
EGUIDE:
A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
EBOOK:
NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
EZINE:
In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.
EZINE:
In this issue, read about how to help customers manage their security portfolios in a world of increasingly complex systems, discover how insights are providing more opportunities for partners, and learn whether being an MSP is enjoyable or not
RESEARCH CONTENT:
The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
EGUIDE:
In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).