EZINE:
The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
RESEARCH CONTENT:
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
EZINE:
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
EZINE:
Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
WHITE PAPER:
Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
EGUIDE:
In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
WHITE PAPER:
This domain name system (DNS) availability report illustrates the risks and impact that site downtime can have on revenue generation, business continuity, customer loyalty and more.
EGUIDE:
This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
CASE STUDY:
This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
EGUIDE:
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.