System Security Reports

Deep learning for countering energy theft – a hybrid long-short term memory approach
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
Posted: 26 Apr 2022 | Published: 26 Apr 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.
Posted: 19 Jul 2022 | Published: 19 Jul 2022

TechTarget ComputerWeekly.com

Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.
Posted: 13 Mar 2023 | Published: 14 Mar 2023

TechTarget ComputerWeekly.com

CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023

TechTarget ComputerWeekly.com

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital
sponsored by TechTarget ComputerWeekly.com
EZINE: Heineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.
Posted: 26 Oct 2022 | Published: 10 Nov 2022

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

Servicenow Finds The Smarter Way To Segment Using Illumio
sponsored by Illumio
CASE STUDY: ServiceNow is a premier cloud platform for IT service management. When they identified the need to address a flat network and properly secure their domain controllers and core services, they knew it was time to refine their network segmentation strategy. Leverage this case study to see how Illumio’s Secure Cloud platform delivered value.
Posted: 28 Dec 2021 | Published: 05 Mar 2021

Illumio

CW Benelux - February-April 2022: Unesco members adopt AI ethics recommendation
sponsored by TechTarget ComputerWeekly.com
EZINE: Unesco member state have adopted an AI ethics recommendation that seeks to define a common set of values and principles to guide the development of ethical AI globally. Also read about a large-scale national cyber exercise in the Netherlands.
Posted: 26 Jan 2022 | Published: 10 Feb 2022

TechTarget ComputerWeekly.com

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com